> ... These avenues do not necessarily violate Homebrew’s core security assumptions (which assume trustworthy formulae),...
> ... These avenues do not necessarily violate Homebrew’s core security assumptions (which assume trustworthy formulae),...