TxzK@lemmy.zip to Programmer Humor@lemmy.ml · 1 year agoHappened to me multiple timeslemmy.zipimagemessage-square205fedilinkarrow-up11.95Karrow-down117 cross-posted to: [email protected]
arrow-up11.93Karrow-down1imageHappened to me multiple timeslemmy.zipTxzK@lemmy.zip to Programmer Humor@lemmy.ml · 1 year agomessage-square205fedilink cross-posted to: [email protected]
minus-squarelad@programming.devlinkfedilinkarrow-up46·1 year agoI’d say that problems mostly come from the need to update dependencies in case of vulnerabilities being discovered. But not every software needs elevated privileges or can become a vector of attack, I guess
I’d say that problems mostly come from the need to update dependencies in case of vulnerabilities being discovered. But not every software needs elevated privileges or can become a vector of attack, I guess