• sugar_in_your_tea
      link
      fedilink
      English
      arrow-up
      2
      ·
      12 hours ago

      The most common source of security vulnerabilities is memory corruption and off by one errors.

      • PoolloverNathan@programming.dev
        link
        fedilink
        English
        arrow-up
        2
        ·
        8 hours ago

        (to make the joke more obvious)

        The two most common sources of security vulnerabilities are buffer overflows, use-after-free, and off-by-one errors.