Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Well a permission model is one way, like OSes have. Another is something like elm with controlled effects, so you can just search the source code and see if something is off.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: