| ▲ | voxl 4 hours ago | |||||||||||||||||||||||||||||||
It's insane to me you spend $200 on a report you likely rarely read in detail or double check for correctness, yet you're doing it to feel good about security. | ||||||||||||||||||||||||||||||||
| ▲ | devttyeu 4 hours ago | parent [-] | |||||||||||||||||||||||||||||||
If it runs in a harness that will alert me when something dodgy is detected I'm fine to stay at that level. I don't read it in detail because reading in detail is precisely what I delegate to the harness. The alternative is that I delegate all this trust to package managers and the maintainers which quite clearly is a bad idea. Whether the $$ pricetag is worth it is.. relative. Also in Go you don't update all that often, really when something either breaks or there is a legitimate security reason to do so, which in deep systems software is quite infrequent. Funnily enough for frontend NPM code our policy was to never ever upgrade and run with locked dependencies, running few years old JS deps. For internal dashboards it was perfectly fine, never missed a feature and never had a supply chain close call. | ||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||