On Tue, Jan 31, 2012 at 06:49:18PM +0000, James Tunnicliffe wrote: > Each build is run on a clean EC2 instance, so shouldn't worry about > logins left behind from other activities. This certainly doesn't open > us up to any more problems than a user who has write access to the box > could cause any other way.
Right, but could some evil code be committed that can modify the configuration to fetch an external exploit and install it into the LEB? -- Christian Robottom Reis, Engineering VP Brazil (GMT-3) | [+55] 16 9112 6430 | [+1] 612 216 4935 Linaro.org: Open Source Software for ARM SoCs _______________________________________________ linaro-dev mailing list linaro-dev@lists.linaro.org http://lists.linaro.org/mailman/listinfo/linaro-dev