To properly submit external services that use OAuth authentication for security review scanning, follow these steps:
1. **Authentication Credentials**: Submit the authentication credentials and, if available, the API documentation for the external services.
2. **Scan Reports**: Provide scan reports for all third-party integrations using tools like Chimera or ZAP, as required.
3. **Secure Storage**: Ensure sensitive information, such as API keys or tokens, is securely stored (e.g., in protected custom settings or metadata).
4. **OAuth Scopes**: Limit OAuth scopes to only what is necessary and avoid using full scope access.
5. **Vulnerability Management**: Address any vulnerabilities identified during the scans and document any false positives with supporting use cases for the review team.
6. **Secure Data Transfer**: Ensure external endpoints securely transfer credentials and data. Obtain permission to perform security testing on endpoints you do not own.
These steps will help ensure compliance with the security review process. Let me know if you need further clarification!