Content is hidden
Violation of Secure Design Principles
Unsecure Design
Weak 2FA Implementation (Missing Failsafe)
Insecure Authentication
Sensitive Data Exposure
Mobile Security Misconfiguration
External Behavior