Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Code location (+) provenance/authorship (+) data flow analysis for adjacent sensitive code.

I would add it to my review tools fwiw.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: