Comment by tjpnz
7 days ago
You might read the source if something breaks but in a successful supply chain attack that's unlikely to happen. You push to production, go home for the evening and maybe get pinged about it by some automation in a few weeks.
No comments yet
Contribute on Hacker News ↗