Contributions to this Security Checklist are encouraged through pull-requests.
- Make an individual pull request for each suggestion.
- Fill the following sections:
- item section
- item title
- company stage
- item details
- item relevant links (minimum 1)
- Keep the item details concise and simple.
- Don't add more than three relevant links.
- The pull request and commit should have a useful title.
- You can also improve current items by submitting pull-requests.
- To keep the quality standard of this checklist high, no more than 3 links can be added to an item.
- We reserve the right to reject pull requests and close issues if we do not agree with how they affect the checklist.
- The items in this list should be relevant to startups.