logoalt Hacker News

int32_64yesterday at 9:21 PM0 repliesview on HN

By using these services, you're also exfiltrating your entire codebase to them, so you have to continuously use the best cyber capabilities providers offer in case a data breach allows somebody to obtain your codebase and an attacker uses a better vulnerability detector than what you were using.