Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You might read the source if something breaks but in a successful supply chain attack that's unlikely to happen. You push to production, go home for the evening and maybe get pinged about it by some automation in a few weeks.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: