| ▲ | flying_sheep 10 hours ago | |
> to harden a system you need to spend more tokens discovering exploits than attackers will spend exploiting them This is true until certain point, unless the requirement / contract itself has loophole which the attacker can exploit it without limit. But I don't think this is the case. Let's say, if someone found an loophole in sort() which can cause denial-of-service. The cause would be the implementation itself, not the contract of sorting. People + AI will figure it out and fix it eventually. | ||