Secure Code Warrior's challenges do not require or allow users to edit the lines of code within our challenges.
Each challenge is composed of three stages:
1. Select the Vulnerability Category
2. Locate the Vulnerability
3. Identify the Solution
All of this is done by simply clicking on various parts of the code. Our users are not expected or able to actually edit the code within any of these stages. For more details about how to play a challenge please read this article
Comments
0 comments
Please sign in to leave a comment.