Configure the SAST tool to scan the root of this directory. Identify vulnerabilities in the codebase (e.g., SQL injection, XSS, command injection, buffer overflows).
The first two permissions ask for location data, both fine and coarse, and the last line is optional but necessary if your app requires GPS to function. You may leave ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results
Feedback