Comment by mirekrusin
8 years ago
You just need to compromise their database and you should have access to plenty of source code running around, possibly with secrets/credentials etc - a disneyland for bad guys.
8 years ago
You just need to compromise their database and you should have access to plenty of source code running around, possibly with secrets/credentials etc - a disneyland for bad guys.
No comments yet
Contribute on Hacker News ↗