Hacker News new | past | comments | ask | show | jobs | submit login

Sure, what you list may or may not have been missed, but they can all be vetted under the same model. It is possible to make things more automatically secure, step by step.



Not really, because the real malicious code can exist out-of-band of the source, and the attack vector is indistinguishable from normal code.


Then you fix that attack vector in the same way. People don't have to solve 100% of the problem immediately; it's still an improvement.




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: