Hacker News new | past | comments | ask | show | jobs | submit login

If an attacker can execute files from the filesystem, and all that's missing to run them is them being present on the filesystem, the attacker could just... write those files themselves? I really don't understand in what scenario this policy makes any sense, apart from "my organization misuses security scanners".



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: