1. How to ensure javascript code quality. deepscan. https://deepscan.io/
2. Welcome to bandit - bandit documentation. https://bandit.readthedocs.io/en/latest/
3. Blessing, J., Specter, M.A., Weitzner, D.J.: You really shouldn’t roll your own crypto: An empirical study of vulnerabilities in cryptographic libraries. arXiv preprint arXiv:2107.04940 (2021)
4. Blochberger, M., Petersen, T., Federrath, H.: Mitigating cryptographic mistakes by design. Mensch und Computer 2019-Workshopband (2019)
5. Checkoway, S., Maskiewicz, J., Garman, C., Fried, J., Cohney, S., Green, M., Heninger, N., Weinmann, R.P., Rescorla, E., Shacham, H.: A systematic analysis of the juniper dual ec incident. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 468-479. Association for Computing Machinery, New York(2016). https://doi.org/10.1145/2976749.2978395, https://doi.org/10.1145/2976749.2978395