logoalt Hacker News

chiitoday at 6:25 AM1 replyview on HN

but then if you could assert the call graph (easily, or even provably correctly), then why not just cull the unused code that led to vulnerability in the first place?


Replies

mseepgoodtoday at 8:08 AM

With a statically compiled language it is usually culled through dead-code elimination (DCE), and with static linking you don’t ship entire libraries.

show 1 reply