Clayton Help Center
Go to Clayton
Go to Clayton
All Collections
Rule documentation
Security best practices
Security best practices
Gabriele Gallo Stampino avatarLorenzo Frattini avatar
By Gabriele and 1 other2 authors18 articles
Passwords set programmatically
Hardcoded secret
Flow Access Restriction
Email spamming risk
Insecure sharing to external users
Server-side Payload Injection
User Registration Without Limits
LWC Clickjacking on CSS
Import of sensitive fields in Lightning Web Components (LWC)
Direct DOM manipulation in Lightning Web Components (LWC)
Sensitive information storage
Sensitive information logging
Excessive data access permissions
Subresource integrity
Content Security Policy (CSP)
Insecure endpoints
Named credentials
Randomization of cryptographic keys
Clayton Help Center
  • Home
  • Twitter
  • LinkedIn
IntercomWe run on Intercom