The dog that didn't bark: finding security holes in what's missing, not what's misconfigured

· Dev.to