{"version":"1.0","provider_name":"@-yet","provider_url":"https:\/\/www.at-yet.de\/en","title":"Secure Code Review","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"mwbMOP5X6J\"><a href=\"https:\/\/www.at-yet.de\/en\/it-security\/application-security\/secure-code-review\">Secure Code Review<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.at-yet.de\/en\/it-security\/application-security\/secure-code-review\/embed#?secret=mwbMOP5X6J\" width=\"600\" height=\"338\" title=\"&#8220;Secure Code Review&#8221; &#8212; @-yet\" data-secret=\"mwbMOP5X6J\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.at-yet.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;subpage-header&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221; el_class=&#8221;header-subtext&#8221;]@-yet comprehensively examines the source code you provide for security gaps, vulnerabilities, outdated dependencies and faulty implementations. In the first step, an automated static and dynamic code analysis is performed, which is supplemented by a manual review in the second step. The rules used for the automated analysis&hellip;"}