Hacker News new | past | comments | ask | show | jobs | submit login

> But there is a simpler path. You write code yourself. Sure, it's more work up front, but once it's written, it's done

Well, assuming you wrote it perfectly and didn't introduce any security vulnerabilities... that you will never be alerted to, because no one else is reviewing your code.




This line of reasoning can’t get you far. Where do dependencies come from?

> security vulnerabilities

Does this code parse untrusted data? Does your process have unlimited access to sensitive resources?


> Does this code parse untrusted data?

I don't understand the question. Yes, I trust the global community of software developers to write a parsing library with sanitization more than I trust myself + my one or two work colleagues.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: