Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Risk factors of open source software beyond CVEs (stacklok.com)
1 point by mooreds on Nov 8, 2024 | past
Proof-of-Diligence: Model trust and maintainability in open source (stacklok.com)
8 points by trickleup on April 17, 2024 | past
NPM install scripts can be weaponized (stacklok.com)
1 point by bubblehack3r on April 7, 2024 | past
How npm install scripts can be weaponized: A real-world example (stacklok.com)
1 point by thunderbong on April 6, 2024 | past
NPM install scripts can be weaponized (stacklok.com)
3 points by fagnerbrack on April 1, 2024 | past
How npm install scripts can be weaponized: a real-world example (stacklok.com)
6 points by ethomson on March 4, 2024 | past
Securing Infrastructure as Code: Step One, Setting Up IaC (stacklok.com)
4 points by skimojoe on Aug 11, 2023 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: