← Back to context Comment by legulere 4 years ago The threat-model there is that the attacker controls the text that is parsed. 0 comments legulere Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗