-
Tetiana Chupryna authored
Vulnerabilities are available under a granulal access: if user has developer access, they get vulnerabilities in response.
1928c5be
Vulnerabilities are available under a granulal access: if user has developer access, they get vulnerabilities in response.