<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Italo Matos</title>
    <description>The latest articles on DEV Community by Italo Matos (@italo_matos_28f801d54d2a7).</description>
    <link>https://dev.to/italo_matos_28f801d54d2a7</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3837609%2F0b531412-c5ea-428e-a7e2-beeadf1ecfd5.png</url>
      <title>DEV Community: Italo Matos</title>
      <link>https://dev.to/italo_matos_28f801d54d2a7</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/italo_matos_28f801d54d2a7"/>
    <language>en</language>
    <item>
      <title>State Management + Security: Why Sensitive Data Needs a Runtime, Not Just State</title>
      <dc:creator>Italo Matos</dc:creator>
      <pubDate>Thu, 09 Apr 2026 14:42:22 +0000</pubDate>
      <link>https://dev.to/italo_matos_28f801d54d2a7/state-management-security-why-sensitive-data-needs-a-runtime-not-just-state-1kij</link>
      <guid>https://dev.to/italo_matos_28f801d54d2a7/state-management-security-why-sensitive-data-needs-a-runtime-not-just-state-1kij</guid>
      <description>&lt;p&gt;While building a real Flutter app, I kept running into a question that I don’t see discussed very often:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;what happens to sensitive data after it enters state?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most state management discussions focus on UI concerns:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;rebuilds&lt;/li&gt;
&lt;li&gt;observability&lt;/li&gt;
&lt;li&gt;async flows&lt;/li&gt;
&lt;li&gt;dependency composition&lt;/li&gt;
&lt;li&gt;side effects&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All of that matters.&lt;/p&gt;

&lt;p&gt;But in real apps, we also deal with values like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;passwords&lt;/li&gt;
&lt;li&gt;OTP codes&lt;/li&gt;
&lt;li&gt;access tokens&lt;/li&gt;
&lt;li&gt;refresh tokens&lt;/li&gt;
&lt;li&gt;session restore data&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And these values are not just “more state”.&lt;/p&gt;

&lt;p&gt;They have retention rules.&lt;br&gt;&lt;br&gt;
They have cleanup rules.&lt;br&gt;&lt;br&gt;
They have persistence constraints.&lt;br&gt;&lt;br&gt;
They have exposure risks.&lt;/p&gt;

&lt;p&gt;That was the problem that pushed me to think about something beyond regular state management.&lt;/p&gt;

&lt;p&gt;Not replacing it.&lt;br&gt;&lt;br&gt;
Just adding another layer of concern to the architecture.&lt;/p&gt;
&lt;h2&gt;
  
  
  The real-world context
&lt;/h2&gt;

&lt;p&gt;This came up while I was building &lt;strong&gt;Ekklesia Worship&lt;/strong&gt;, a Flutter app for creating worship playbacks for churches.&lt;/p&gt;

&lt;p&gt;The product itself is media-focused, but once you add things like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;login&lt;/li&gt;
&lt;li&gt;account creation&lt;/li&gt;
&lt;li&gt;OTP verification&lt;/li&gt;
&lt;li&gt;session restore&lt;/li&gt;
&lt;li&gt;logout&lt;/li&gt;
&lt;li&gt;marketplace access&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;auth and session data become part of the architecture too.&lt;/p&gt;

&lt;p&gt;And that is where the problem starts to feel very real.&lt;/p&gt;

&lt;p&gt;A password typed during login should not just sit in memory until something happens to overwrite it.&lt;/p&gt;

&lt;p&gt;An OTP should not remain around after verification.&lt;/p&gt;

&lt;p&gt;A refresh token should not be treated like just another string in a ViewModel.&lt;/p&gt;
&lt;h2&gt;
  
  
  State management solves one part of the problem
&lt;/h2&gt;

&lt;p&gt;Most state managers do a good job answering questions like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;what changed?&lt;/li&gt;
&lt;li&gt;who should react to it?&lt;/li&gt;
&lt;li&gt;when should the UI rebuild?&lt;/li&gt;
&lt;li&gt;how do I represent loading, success, and error?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That part is already well explored.&lt;/p&gt;

&lt;p&gt;The part that kept bothering me was different:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;how long should this sensitive value live?&lt;/li&gt;
&lt;li&gt;when should it be cleared?&lt;/li&gt;
&lt;li&gt;should it expire automatically?&lt;/li&gt;
&lt;li&gt;should it be persisted at all?&lt;/li&gt;
&lt;li&gt;should it show up redacted in logs?&lt;/li&gt;
&lt;li&gt;should it exist only in memory?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That started to feel like a &lt;strong&gt;runtime concern&lt;/strong&gt;, not just a UI state concern.&lt;/p&gt;
&lt;h2&gt;
  
  
  The idea: explicit lifecycle for sensitive data
&lt;/h2&gt;

&lt;p&gt;The idea I started exploring was simple:&lt;/p&gt;

&lt;p&gt;what if sensitive values were not just raw fields inside state, but values with explicit lifecycle policies?&lt;/p&gt;

&lt;p&gt;Something like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight dart"&gt;&lt;code&gt;&lt;span class="kd"&gt;final&lt;/span&gt; &lt;span class="n"&gt;password&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;SafeData&lt;/span&gt;&lt;span class="p"&gt;&amp;lt;&lt;/span&gt;&lt;span class="kt"&gt;String&lt;/span&gt;&lt;span class="o"&gt;?&lt;/span&gt;&lt;span class="p"&gt;&amp;gt;(&lt;/span&gt;
  &lt;span class="nl"&gt;initialValue:&lt;/span&gt; &lt;span class="n"&gt;typedPassword&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
  &lt;span class="nl"&gt;policy:&lt;/span&gt; &lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="n"&gt;SafeDataPolicy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;
    &lt;span class="nl"&gt;clearOnDispose:&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="nl"&gt;clearOnCommandSuccess:&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="s"&gt;'login'&lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;
    &lt;span class="nl"&gt;logStrategy:&lt;/span&gt; &lt;span class="n"&gt;SafeDataLogStrategy&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;redacted&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
  &lt;span class="p"&gt;),&lt;/span&gt;
&lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="kd"&gt;final&lt;/span&gt; &lt;span class="n"&gt;otpCode&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;SafeData&lt;/span&gt;&lt;span class="p"&gt;&amp;lt;&lt;/span&gt;&lt;span class="kt"&gt;String&lt;/span&gt;&lt;span class="o"&gt;?&lt;/span&gt;&lt;span class="p"&gt;&amp;gt;(&lt;/span&gt;
  &lt;span class="nl"&gt;policy:&lt;/span&gt; &lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="n"&gt;SafeDataPolicy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;
    &lt;span class="nl"&gt;clearOnDispose:&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="nl"&gt;clearOnCommandSuccess:&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="s"&gt;'verifyOtp'&lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;
    &lt;span class="nl"&gt;expiresAfter:&lt;/span&gt; &lt;span class="n"&gt;Duration&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nl"&gt;seconds:&lt;/span&gt; &lt;span class="mi"&gt;30&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt;
    &lt;span class="nl"&gt;persistence:&lt;/span&gt; &lt;span class="n"&gt;SafeDataPersistence&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;memoryOnly&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="nl"&gt;logStrategy:&lt;/span&gt; &lt;span class="n"&gt;SafeDataLogStrategy&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;masked&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
  &lt;span class="p"&gt;),&lt;/span&gt;
&lt;span class="p"&gt;);&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The important part here is not the exact API.&lt;/p&gt;

&lt;p&gt;The important part is the shift in modeling.&lt;/p&gt;

&lt;p&gt;The password stops being just a &lt;code&gt;String?&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;The OTP stops being just another field in state.&lt;/p&gt;

&lt;p&gt;Both start carrying explicit lifecycle rules.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why this matters
&lt;/h2&gt;

&lt;p&gt;In practice, this changes a lot.&lt;/p&gt;

&lt;h3&gt;
  
  
  Passwords
&lt;/h3&gt;

&lt;p&gt;Passwords usually have a very short useful lifetime.&lt;/p&gt;

&lt;p&gt;They need to exist:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;while the user types&lt;/li&gt;
&lt;li&gt;while the login request is running&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;After that, keeping them around usually does not make sense.&lt;/p&gt;

&lt;h3&gt;
  
  
  OTP codes
&lt;/h3&gt;

&lt;p&gt;OTP values are even more obviously ephemeral.&lt;/p&gt;

&lt;p&gt;They may need:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;short expiration&lt;/li&gt;
&lt;li&gt;automatic cleanup after success&lt;/li&gt;
&lt;li&gt;cleanup on dispose&lt;/li&gt;
&lt;li&gt;masked logging&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Access tokens
&lt;/h3&gt;

&lt;p&gt;Access tokens often make sense only in memory and only for a short time.&lt;/p&gt;

&lt;h3&gt;
  
  
  Refresh tokens
&lt;/h3&gt;

&lt;p&gt;Refresh tokens usually have a different lifecycle:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;secure persistence&lt;/li&gt;
&lt;li&gt;explicit restore&lt;/li&gt;
&lt;li&gt;cleanup on logout&lt;/li&gt;
&lt;li&gt;no raw exposure in logs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That distinction is exactly why “state” alone often feels too broad.&lt;/p&gt;

&lt;h2&gt;
  
  
  Session persistence is where this gets interesting
&lt;/h2&gt;

&lt;p&gt;The part that made this idea feel really useful was session persistence.&lt;/p&gt;

&lt;p&gt;Because once you model a session more carefully, you start realizing that not every sensitive value should be treated the same way.&lt;/p&gt;

&lt;p&gt;A more explicit model might look like this:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;password: temporary&lt;/li&gt;
&lt;li&gt;OTP: temporary and expiring&lt;/li&gt;
&lt;li&gt;access token: memory-only&lt;/li&gt;
&lt;li&gt;refresh token: optionally persisted securely&lt;/li&gt;
&lt;li&gt;restore: explicit&lt;/li&gt;
&lt;li&gt;logout: centralized cleanup&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight dart"&gt;&lt;code&gt;&lt;span class="kd"&gt;final&lt;/span&gt; &lt;span class="n"&gt;accessToken&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;SafeData&lt;/span&gt;&lt;span class="p"&gt;&amp;lt;&lt;/span&gt;&lt;span class="kt"&gt;String&lt;/span&gt;&lt;span class="o"&gt;?&lt;/span&gt;&lt;span class="p"&gt;&amp;gt;(&lt;/span&gt;
  &lt;span class="nl"&gt;policy:&lt;/span&gt; &lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="n"&gt;SafeDataPolicy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;
    &lt;span class="nl"&gt;clearOnDispose:&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="nl"&gt;persistence:&lt;/span&gt; &lt;span class="n"&gt;SafeDataPersistence&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;memoryOnly&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="nl"&gt;logStrategy:&lt;/span&gt; &lt;span class="n"&gt;SafeDataLogStrategy&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;redacted&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
  &lt;span class="p"&gt;),&lt;/span&gt;
&lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="kd"&gt;final&lt;/span&gt; &lt;span class="n"&gt;refreshToken&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;SafeData&lt;/span&gt;&lt;span class="p"&gt;&amp;lt;&lt;/span&gt;&lt;span class="kt"&gt;String&lt;/span&gt;&lt;span class="o"&gt;?&lt;/span&gt;&lt;span class="p"&gt;&amp;gt;(&lt;/span&gt;
  &lt;span class="nl"&gt;policy:&lt;/span&gt; &lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="n"&gt;SafeDataPolicy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;
    &lt;span class="nl"&gt;clearOnDispose:&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="nl"&gt;persistence:&lt;/span&gt; &lt;span class="n"&gt;SafeDataPersistence&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;secureStorage&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="nl"&gt;logStrategy:&lt;/span&gt; &lt;span class="n"&gt;SafeDataLogStrategy&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;redacted&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
  &lt;span class="p"&gt;),&lt;/span&gt;
&lt;span class="p"&gt;);&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That makes session handling feel much more intentional.&lt;/p&gt;

&lt;h2&gt;
  
  
  Important nuance
&lt;/h2&gt;

&lt;p&gt;I do &lt;strong&gt;not&lt;/strong&gt; think every token should live in UI state.&lt;/p&gt;

&lt;p&gt;In many cases, the better path is to let the auth layer own session persistence and read the current session on demand.&lt;/p&gt;

&lt;p&gt;That is usually cleaner.&lt;/p&gt;

&lt;p&gt;The problem I’m pointing at is slightly broader:&lt;/p&gt;

&lt;p&gt;even if tokens themselves are not stored in app state, sensitive values still pass through the app runtime during real flows:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;passwords&lt;/li&gt;
&lt;li&gt;OTP codes&lt;/li&gt;
&lt;li&gt;recovery data&lt;/li&gt;
&lt;li&gt;temporary credentials&lt;/li&gt;
&lt;li&gt;transition/merge cases&lt;/li&gt;
&lt;li&gt;restore artifacts&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So the question becomes less:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;should tokens live in state?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;And more:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;how explicitly are we handling the lifecycle of sensitive values when they inevitably exist somewhere in the app runtime?&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  This is not “perfect security”
&lt;/h2&gt;

&lt;p&gt;I think it’s important to be honest here.&lt;/p&gt;

&lt;p&gt;This kind of approach does &lt;strong&gt;not&lt;/strong&gt; solve:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;debugger access&lt;/li&gt;
&lt;li&gt;compromised devices&lt;/li&gt;
&lt;li&gt;memory dumps&lt;/li&gt;
&lt;li&gt;perfect string zeroization&lt;/li&gt;
&lt;li&gt;absolute runtime secrecy&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That would be an exaggerated claim.&lt;/p&gt;

&lt;p&gt;What it tries to improve is something much more practical:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;less accidental retention&lt;/li&gt;
&lt;li&gt;less unintended persistence&lt;/li&gt;
&lt;li&gt;clearer cleanup rules&lt;/li&gt;
&lt;li&gt;better expiration handling&lt;/li&gt;
&lt;li&gt;safer logs&lt;/li&gt;
&lt;li&gt;more explicit architecture&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That already brings real value.&lt;/p&gt;

&lt;h2&gt;
  
  
  What other state managers solve, and what this is trying to solve
&lt;/h2&gt;

&lt;p&gt;I’m not trying to turn this into a Riverpod vs Bloc vs MobX discussion.&lt;/p&gt;

&lt;p&gt;To me, this is a different question.&lt;/p&gt;

&lt;p&gt;Most state managers solve state observation and UI flow really well.&lt;/p&gt;

&lt;p&gt;What I’m exploring here is whether sensitive data lifecycle deserves to be modeled more explicitly inside the architecture.&lt;/p&gt;

&lt;p&gt;Not because existing tools are wrong.&lt;/p&gt;

&lt;p&gt;But because this concern often ends up fully manual, scattered, and easy to forget.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why I ended up exploring this in Stasis
&lt;/h2&gt;

&lt;p&gt;Part of this exploration ended up shaping some ideas in the &lt;code&gt;flutter_stasis&lt;/code&gt; ecosystem.&lt;/p&gt;

&lt;p&gt;The package originally came out of building Ekklesia and refining how I wanted lifecycle, async flow, and UI events to behave.&lt;/p&gt;

&lt;p&gt;Then this other concern became hard to ignore.&lt;/p&gt;

&lt;p&gt;At some point, it stopped feeling like “just app code” and started feeling like a missing primitive.&lt;/p&gt;

&lt;p&gt;So I began experimenting with the idea of a runtime-oriented layer for sensitive data lifecycle.&lt;/p&gt;

&lt;p&gt;Not as a replacement for state management.&lt;/p&gt;

&lt;p&gt;Just as something that sits next to it and makes this part of the architecture more explicit.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final thought
&lt;/h2&gt;

&lt;p&gt;State management solves a lot.&lt;/p&gt;

&lt;p&gt;But for sensitive values, the most important question is often not just:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;what changed?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sometimes the real question is:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;how long should this value live, and who is responsible for cleaning it up?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To me, that feels important enough to be modeled explicitly.&lt;/p&gt;

&lt;p&gt;If you’ve dealt with auth-heavy Flutter apps, I’d be curious:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;do you treat passwords, OTPs, and tokens as just more state, or do you model their lifecycle separately?&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Links
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;GitHub: &lt;a href="https://github.com/DIMAAGR/flutter_stasis" rel="noopener noreferrer"&gt;https://github.com/DIMAAGR/flutter_stasis&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;flutter_stasis: &lt;a href="https://pub.dev/packages/flutter_stasis" rel="noopener noreferrer"&gt;https://pub.dev/packages/flutter_stasis&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;flutter_stasis_secure: &lt;a href="https://pub.dev/packages/flutter_stasis_secure" rel="noopener noreferrer"&gt;https://pub.dev/packages/flutter_stasis_secure&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Medium article: &lt;a href="https://medium.com/@italomatos.developer/state-management-security-why-sensitive-data-needs-a-runtime-not-just-state-e580dafa37a1" rel="noopener noreferrer"&gt;https://medium.com/@italomatos.developer/state-management-security-why-sensitive-data-needs-a-runtime-not-just-state-e580dafa37a1&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>flutter</category>
      <category>statemanagement</category>
      <category>security</category>
      <category>architecture</category>
    </item>
  </channel>
</rss>
