• A Regular security audits
  • B Open redirects
  • C Input validation
  • D Intercepting validator