Hacker News new | past | comments | ask | show | jobs | submit login

I agree... You can only validate what is presented to you; a hacker won't kindly hand you a piece of code to run after exploited a hole and ask you to verify it.

It also rather circuitous, browsers already verify what they are executing.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: