←back to thread

171 points irke882 | 1 comments | | HN request time: 0.488s | source
Show context
Sjoerd ◴[] No.44507062[source]
What is the attack scenario here? Where are the security boundaries? How does the attacker gets their repository with a symlink in it to the victim? Is Helm typically run as a privileged user? How would this work? And why doesn't the vulnerability description give answers to these questions?
replies(3): >>44508183 #>>44509972 #>>44515929 #
1. xyst ◴[] No.44509972[source]
Questions like this make me wonder if "hacker" news needs a rebranding.

Basic tech news?

Capitalist news?

Vulture Capitalist news?