Skip to main content

Does Sentry regularly scan for vulnerabilities? What tools are used and what is the cadence?

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request
Return to top