Comment by james_marks
6 hours ago
The answer is Yes, this can be exploited from the outside by taking over dev machines and using their access.
If you answer No and complain that it’s not taken seriously, it’s at least in part because you didn’t show the risk clearly.
No comments yet
Contribute on Hacker News ↗