13 lines
582 B
Markdown
13 lines
582 B
Markdown
Review the changes from a security perspective. Check for the following vulnerabilities:
|
|
- Injection attacks (SQL, command, XSS)
|
|
- Authentication and authorization flaws
|
|
- Data exposure risks
|
|
- Cryptographic weaknesses
|
|
|
|
## Judgment Procedure
|
|
|
|
1. Review the change diff and detect issues based on the security criteria above
|
|
- Cross-check changes against REJECT criteria tables defined in knowledge
|
|
2. For each detected issue, classify as blocking/non-blocking based on Policy's scope determination table and judgment rules
|
|
3. If there is even one blocking issue, judge as REJECT
|