Skip to main content
Skip table of contents

Mitigation Strategy

In addition to the probe results, each probe includes a tab showing a mitigation strategy to address vulnerabilities identified by the probe, which can be applied to your target application.

These steps are created based on content provided by our red team, who propose best practices they have identified through research and hands-on experience.

Each step includes a Mark as Completed button, allowing you to track whether the mitigation has been applied to a specific target.

For reference, you can view examples of mitigation strategy steps for Context Leakage probe.

image-20250207-132325.png

Figure 1: Mitigation Strategy for Context Leakage Probe

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.