Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Just would like to note that if you use something like this do your own security audits and keep your own repositories or this could be an easy attack vector


Yes very true, we are aware and mindful. We have a number of open-source "Targets" (template generators) plus allow customers to use their own. But that has to be configured explicitly.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: