• sugar_in_your_tea
    link
    fedilink
    English
    arrow-up
    2
    ·
    11 hours ago

    The most common source of security vulnerabilities is memory corruption and off by one errors.

    • PoolloverNathan@programming.dev
      link
      fedilink
      English
      arrow-up
      2
      ·
      6 hours ago

      (to make the joke more obvious)

      The two most common sources of security vulnerabilities are buffer overflows, use-after-free, and off-by-one errors.