Workflow: Vulnerabilites
We should discuss about https://bestpractices.coreinfrastructure.org/en/projects/3579 Vulnerabilities. Should they be monitored? Is this applicable to SADE at all?
We should discuss about https://bestpractices.coreinfrastructure.org/en/projects/3579 Vulnerabilities. Should they be monitored? Is this applicable to SADE at all?