0 / 60 seg.

Which type of security assessment requires access to source code?