top | item 46716471

(no title)

StrauXX | 1 month ago

Simple. You multiple instances with different flags covering different threat models. RCE, file read, etc. You then expose a webapplication for every instance that lets users control only those curl flags, that must be safe to be user controlled in the reapective threat model.

discuss

order

No comments yet.