Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I mean, both, but in this case I'm saying "don't use it to access any kind of production resource", with a side order of "don't rely on simple sandboxing (e.g. command patterns) to prevent things like database deletions".




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: