Contributions to this Security Overview are encouraged through pull-requests.
- Make an individual pull request for each suggestion.
- Fill the following sections:
- Recommended for
- Explanation
- Customization
- Description
- Keep the item description concise and simple.
- Avoid heavy customizations on an item
- The pull request and commit should have a useful title.
- You can also improve current items by submitting pull-requests.
- We reserve the right to reject pull requests and close issues if we do not agree with how they affect the overview.
- The items in this list should be relevant to as many people as possible.