Wasn’t aware of the open source codebase, my bad.
My point more broadly was: you cannot point it to <some domain> and magically hack it.
But yeah, if you have everything open-sourced, then it’s much easier to find source code that contains vulnerabilities such that they would allow RCE.
Wasn’t aware of the open source codebase, my bad.
My point more broadly was: you cannot point it to <some domain> and magically hack it.
But yeah, if you have everything open-sourced, then it’s much easier to find source code that contains vulnerabilities such that they would allow RCE.