logoalt Hacker News

sandermvanvlietyesterday at 9:51 PM0 repliesview on HN

If you think about this in the context of systems that ingest content from third party systems then this attack becomes more feasible.

But then, if you’re inside the network you’ve already overcome many of the boundaries