diff --git a/owasp-top10-2016-mobile/m2/cool_games/README.md b/owasp-top10-2016-mobile/m2/cool_games/README.md index 812ab1316..14b21c71d 100644 --- a/owasp-top10-2016-mobile/m2/cool_games/README.md +++ b/owasp-top10-2016-mobile/m2/cool_games/README.md @@ -178,7 +178,7 @@ How would you mitigate this vulnerability? After your changes, an attacker shoul ## PR solutions -[Spoiler alert 🚨] To understand how this vulnerability can be mitigated, check out [these pull requests](https://github.com/globocom/secDevLabs/pulls?q=is%3Apr+is%3Aclosed+label%3AM2-OWASP-2016+label%3A%22Cool+Games%22)! +[Spoiler alert 🚨] To understand how this vulnerability can be mitigated, check out [these pull requests](https://github.com/globocom/secDevLabs/pulls?q=is%3Apr+label%3A%22Cool+Games%22+label%3A%22mitigation+solution+%F0%9F%94%92%22)! ## Contributing diff --git a/owasp-top10-2016-mobile/m4/note-box/README.md b/owasp-top10-2016-mobile/m4/note-box/README.md index 545dc9f86..f25822fd3 100644 --- a/owasp-top10-2016-mobile/m4/note-box/README.md +++ b/owasp-top10-2016-mobile/m4/note-box/README.md @@ -126,7 +126,7 @@ How would you mitigate this vulnerability? After your changes, an attacker shoul ## PR solutions -[Spoiler alert 🚨] To understand how this vulnerability can be mitigated, check out [these pull requests](https://github.com/globocom/secDevLabs/pulls?q=is%3Apr+is%3Aclosed+label%3AM4-OWASP-2016+label%3A%22mitigation+solution+%F0%9F%94%92%22)! +[Spoiler alert 🚨] To understand how this vulnerability can be mitigated, check out [these pull requests](https://github.com/globocom/secDevLabs/pulls?q=is%3Apr+label%3A%22mitigation+solution+%F0%9F%94%92%22+label%3A%22Note+Box%22)! ## Contributing diff --git a/owasp-top10-2016-mobile/m5/panda_zap/README.md b/owasp-top10-2016-mobile/m5/panda_zap/README.md index 25043cb96..6b8a4a81d 100644 --- a/owasp-top10-2016-mobile/m5/panda_zap/README.md +++ b/owasp-top10-2016-mobile/m5/panda_zap/README.md @@ -198,7 +198,7 @@ How would you mitigate this vulnerability? After your changes, the app should no ## PR solutions -[Spoiler alert 🚨] To understand how this vulnerability can be mitigated, check out [these pull requests](https://github.com/globocom/secDevLabs/pulls?q=is%3Apr+is%3Aclosed+label%3A%22Panda+Zap%22+label%3AM5-OWASP-2016+label%3A%22mitigation+solution+%F0%9F%94%92%22)! +[Spoiler alert 🚨] To understand how this vulnerability can be mitigated, check out [these pull requests](https://github.com/globocom/secDevLabs/pulls?q=is%3Apr+label%3A%22Panda+Zap%22+label%3A%22mitigation+solution+%F0%9F%94%92%22+)! ## Contributing diff --git a/owasp-top10-2021-apps/a1/camplake-api/README.md b/owasp-top10-2021-apps/a1/camplake-api/README.md index 5349ae5b8..7c8cb8d7b 100644 --- a/owasp-top10-2021-apps/a1/camplake-api/README.md +++ b/owasp-top10-2021-apps/a1/camplake-api/README.md @@ -113,7 +113,7 @@ How would you mitigate this vulnerability? After your changes, an attacker shoul ## PR solutions -[Spoiler alert 🚨 ] To understand how this vulnerability can be mitigated, check out [these pull requests]()! +[Spoiler alert 🚨 ] To understand how this vulnerability can be mitigated, check out [these pull requests](https://github.com/globocom/secDevLabs/pulls?q=is%3Apr+label%3A%22mitigation+solution+%F0%9F%94%92%22+label%3ACamplake-API)! ## Contributing @@ -123,4 +123,4 @@ We encourage you to contribute to SecDevLabs! Please check out the [Contributing [Docker Compose Install]: https://docs.docker.com/compose/install/ [App]: http://localhost:10005 [secDevLabs]: https://github.com/globocom/secDevLabs -[2]:https://github.com/globocom/secDevLabs/tree/master/owasp-top10-2017-apps/a5/ecommerce-api \ No newline at end of file +[2]:https://github.com/globocom/secDevLabs/tree/master/owasp-top10-2017-apps/a5/ecommerce-api diff --git a/owasp-top10-2021-apps/a5/stegonography/README.md b/owasp-top10-2021-apps/a5/stegonography/README.md index 44e5dd3ae..d59d205cb 100644 --- a/owasp-top10-2021-apps/a5/stegonography/README.md +++ b/owasp-top10-2021-apps/a5/stegonography/README.md @@ -129,7 +129,7 @@ How would you mitigate this vulnerability? After your changes, an attacker shoul ## PR solutions -[Spoiler alert 🚨] To understand how this vulnerability can be mitigated, check out [these pull requests](https://github.com/globocom/secDevLabs/pulls?utf8=%E2%9C%93&q=is%3Aclosed+is%3Apr+label%3AA6-OWASP-2017+label%3AStegonography)! +[Spoiler alert 🚨] To understand how this vulnerability can be mitigated, check out [these pull requests](https://github.com/globocom/secDevLabs/pulls?q=is%3Apr+label%3AStegonography+label%3A%22mitigation+solution+%F0%9F%94%92%22+)! ## Contributing