Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> A more fine-grained approach that limited network access by source file might be valuable.

This is what I think I'd like to see as well. The most common case isn't that I don't trust the program I'm running, it's that the level of trust for my dependencies plus their dependencies is essentially opaque.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: