Specific security audits would have to be searched for, though.
[1]: https://snikket.org/open-source/