Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It can read your application source code, read your database credentials, access your database, and exfiltrate its contents. Yes, you are at risk.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: