top | item 46594611

(no title)

Proofread0592 | 1 month ago

Is the idea that hackers can review the source for vulnerabilities?

I would imagine any internet-facing application would not have any issues with a source code "leak" like this, as all inter-app communication is based on short-lived credentials.

discuss

order

No comments yet.