ok, cool. I don't have any sort of specific implementation or anything.
Just a concern. thanks!


On Fri, Feb 1, 2013 at 10:31 AM, William Mills <wmills_92...@yahoo.com>wrote:

> Here is probably your best bet if it's a design question.  If it's a
> specific implementation then send it to the company in question first if
> you think they have a vulnerability.
>
>   ------------------------------
> *From:* L. Preston Sego III <lpse...@gmail.com>
> *To:* oauth@ietf.org
> *Sent:* Thursday, January 31, 2013 6:01 AM
> *Subject:* [OAUTH-WG] Where / how do we report security risks?
>
> Don't want hackers to try anything on oauth2-using applications...
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to