ok, cool. I don't have any sort of specific implementation or anything.
Just a concern. thanks!


On Fri, Feb 1, 2013 at 10:31 AM, William Mills <[email protected]>wrote:

> Here is probably your best bet if it's a design question.  If it's a
> specific implementation then send it to the company in question first if
> you think they have a vulnerability.
>
>   ------------------------------
> *From:* L. Preston Sego III <[email protected]>
> *To:* [email protected]
> *Sent:* Thursday, January 31, 2013 6:01 AM
> *Subject:* [OAUTH-WG] Where / how do we report security risks?
>
> Don't want hackers to try anything on oauth2-using applications...
>
> _______________________________________________
> OAuth mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to