Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Great succinct summary of a hard problem!

I might reword: "attacker-controlled data, sensitive information, and a data exfiltration capability"

to: "attacker-controlled data and privileged operations (e.g. sensitive information acces+data exfiltration or ability to do operations to production system)"



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: