On Tue, Jan 31, 2012 at 06:49:18PM +0000, James Tunnicliffe wrote:
> Each build is run on a clean EC2 instance, so shouldn't worry about
> logins left behind from other activities. This certainly doesn't open
> us up to any more problems than a user who has write access to the box
> could cause any other way.

Right, but could some evil code be committed that can modify the
configuration to fetch an external exploit and install it into the LEB?
-- 
Christian Robottom Reis, Engineering VP
Brazil (GMT-3) | [+55] 16 9112 6430 | [+1] 612 216 4935
Linaro.org: Open Source Software for ARM SoCs

_______________________________________________
linaro-dev mailing list
linaro-dev@lists.linaro.org
http://lists.linaro.org/mailman/listinfo/linaro-dev

Reply via email to