What about "endemic" stack traces in production logs?
A password that when entered with any of the e-mail addresses lets you impersonate that user..
A 10+ years old codebase with no test coverage at all..
APIs with no authentication and only the thin protection of a VPN..
Millions of personal records stored and processed without the user consent..
Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink.
Hide child comments as well
Confirm
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
What about "endemic" stack traces in production logs?
A password that when entered with any of the e-mail addresses lets you impersonate that user..
A 10+ years old codebase with no test coverage at all..
APIs with no authentication and only the thin protection of a VPN..
Millions of personal records stored and processed without the user consent..