14 lines
358 B
Cheetah
14 lines
358 B
Cheetah
|
|
# Security Audit
|
||
|
|
|
||
|
|
## Target
|
||
|
|
{{.Repo}} — {{.Task}}
|
||
|
|
|
||
|
|
## Checklist
|
||
|
|
- [ ] Thread safety (race conditions, missing locks)
|
||
|
|
- [ ] Path traversal / sandbox escapes
|
||
|
|
- [ ] Injection (command, SQL, log)
|
||
|
|
- [ ] Error handling (swallowed errors, nil pointer risks)
|
||
|
|
- [ ] Authentication / authorisation gaps
|
||
|
|
- [ ] Cryptographic misuse
|
||
|
|
- [ ] Write findings to FINDINGS.md
|