Comment by comex
2 months ago
Yes, that’s the OP’s main point, but their choice of examples suggests that they are also thinking about trusted input.
2 months ago
Yes, that’s the OP’s main point, but their choice of examples suggests that they are also thinking about trusted input.
In the context of security holes.