Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

TFA mentions this option and then goes on at some length to explain that this doesn't help for transitive dependencies, which is how these attacks usually work.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: