All data transmission happens over secure communication channels (over HTTPS).
An unauthorized remote attacker can retrieve any user's sensitive data on the platform by changing the contents of the API endpoints.
A remote attacker can access secret keys from the server endpoints, causing the attacker to gain sensitive user information stored on the server
The app allows the users to edit their information and delete their account in the app.