Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Then you can put monitor.txt behind that password protected endpoint too. My point is that whoever you need to give access to the file also has access to the actual website, which has all the information (it has to, since it's supposed to be able to test against it).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: