top | item 37417895 (no title) macca321 | 2 years ago You can exfiltrate secrets that aren't in the state, but are in accessible resources during a plan using an http data source with the secret encoded into the url discuss order hn newest No comments yet.
No comments yet.