15 pointsby strict99 hours ago1 comment
  • Proofread05925 hours ago
    Is the idea that hackers can review the source for vulnerabilities?

    I would imagine any internet-facing application would not have any issues with a source code "leak" like this, as all inter-app communication is based on short-lived credentials.