Hacker News new | past | comments | ask | show | jobs | submit login

In that case, you would lock down the key so it could only be used to execute the strict subset of commands to do its job. It is very common practice, but is not mentioned at all in the blog post.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: