@nerdpr0f @tinker how many libraries are situated where an exploit could be involved in the early phases of auth code?
@enobacon @tinker Probably not a ton, but there's a bunch of other ways one could design the trigger.
@enobacon @tinker Probably not a ton, but there's a bunch of other ways one could design the trigger.