I understand when POST is required and code has been implemented accordingly. But software penetration test comes back this recommendation:
Only accept POST request f