Experimental browser for the Atmosphere
Loading post...
{ "uri": "at://did:plc:64pz2qisbkevqu7ry2w2bubu/app.bsky.feed.like/3loq4ay3jly26", "cid": "bafyreiej5w7d4dss7itmxtnmipp7s2d5u5pu2rwrfzcn62ggcgfwqb3ygu", "value": { "$type": "app.bsky.feed.like", "subject": { "cid": "bafyreifnkeyuv5kkmcunocm6c4fgq4hvacnj46x5klh4amre776u5dpxp4", "uri": "at://did:plc:e2p7kehepodpkozranhvp56u/app.bsky.feed.post/3lopww5kxquu2" }, "createdAt": "2025-05-09T09:25:58.481Z" } }
If you can trick a user to run a command tool in a way that ends up causing the user problems, that is not a security problem in that tool. Just saying. In case you're thinking of submitting such a report about a command line tool in your toolbox. But surely no sane person would. Right? Right?
May 9, 2025, 7:50 AM