Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I would clarify that as running code somewhere you don’t already control. The classic approach would be a malformed request letting them run code on someone else’s server, but this other pull-based approach also qualifies since it’s running code on a stranger’s computer.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: