I was curious but good old auto suggest scared me away. It’s concerning when Hestia exploits is one of the suggestions, so I looked into it and saw a few hits. I didn’t investigate them though, I stopped looking then.
Just your normal everyday casual software dev. Nothing to see here.
I was curious but good old auto suggest scared me away. It’s concerning when Hestia exploits is one of the suggestions, so I looked into it and saw a few hits. I didn’t investigate them though, I stopped looking then.
the amount of software I’ve used that lacks this type of system is aggravating. How hard is it to keep an object of property names, and if the name isn’t in it then it errors.
this can be continued into command line as well. if flag -z doesn’t exist, you shouldn’t allow me to run a command with it. It’s clear I am trying to do something (incorrectly) thinking -z is something it isn’t, just error it and tell me that.
the sad thing is, according to that article, the only reason it was caught is because a major dealership lobby caught wind and reported it. They might have got away with it otherwise(if they are illegitimate)