Hacker News new | past | comments | ask | show | jobs | submit login

They could be, or they could be nothing, and the program might not even be exposed to untrusted input anyway.

We can have a discussion about perhaps splitting programs into security classes, though I would prefer the upstream people use the cutting edge security analysis, then backport patches with security advisories.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: