← Back to context Comment by charcircuit 3 days ago If an attacker can figure out what sites it can be used on, they can use the API. 0 comments charcircuit Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗