Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> It'll prevent this kind of attacks completely

It won't. The same approach works just fine in your build specification or other config files. And it doesn't solve the root of this problem, which is that you are compiling source code you don't control and don't audit closely into your binary. Sneaky text is not the only way of getting malicious code through code review.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: