the application source which took quite some time. After the tool became available we\r
didn't get any new insights regarding potential security risks, just more examples\r
of problems we already detected. An example would be the use of the \code{crypt()} \PHP{}\r
the application source which took quite some time. After the tool became available we\r
didn't get any new insights regarding potential security risks, just more examples\r
of problems we already detected. An example would be the use of the \code{crypt()} \PHP{}\r