Remix.run Logo
rs_rs_rs_rs_rs 2 hours ago

>How is it authenticated? I went looking briefly but didn't turn up much; obviously there's the ssh auth itself but if you have access to the remote, is there an additional layer of auth stopping anyone from executing code via the daemon?

How many prompts and auth layers do you guys need until you shup up? I swear to God security people have completely lost touch with reality.