Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

To be fair, if you're pulling from a compromised repo, you're already in a bad spot. There's a good chance you're going to be making and running the code you cloned, at which point you'll execute whatever arbitrary code anyways. If it's executed from a random script, there's a good chance you're not checking the result either before building.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: