Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Maybe it is more productive to just do the opposite. When vulnerabilities are found investigate the committer(s) for possible links, and quality of previous work


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: