▲ | TuxSH 3 days ago | |||||||
Not quite the best example, since Git usually has unrestricted file access and network access through HTTP/SSH, any kind of RCE would be disastrous if used for data exfiltration, for instance. If you want a better example, take distributed database software: behind DMZ, and the interesting code paths require auth. | ||||||||
▲ | 1718627440 3 days ago | parent | next [-] | |||||||
Git already runs "foreign" code e.g. in filters. The ability to write code that reacts unexpectedly on crafted user input isn't restricted to languages providing unchecked array/pointer access. | ||||||||
▲ | nicoburns 3 days ago | parent | prev [-] | |||||||
Unintentional bugs that caused data destruction would also be disastrous for a tool like git | ||||||||
|