Comment by Goofy_Coyote
2 hours ago
Seconding this.
I've seen it make the codebase vulnerable by changing the source, then claiming it found a vuln, or finding a well-defended and secure exec function, write a unit test that shows what exec does (which is running commands), then claiming a critical finding.
No comments yet
Contribute on Hacker News ↗