phiresky@lemmy.world to Programmer Humor@lemmy.ml · 1 year agoHacking in 1980 vs Hacking in 2024lemmy.worldimagemessage-square8fedilinkarrow-up123
arrow-up123imageHacking in 1980 vs Hacking in 2024lemmy.worldphiresky@lemmy.world to Programmer Humor@lemmy.ml · 1 year agomessage-square8fedilink
minus-squareresidentmarchant@lemmy.worldlinkfedilinkEnglisharrow-up5·1 year agoThere’s no way the model has access to that information, though. Google’s important product must have proper scoped secret management, not just environment variables or similar.
minus-squarenomecks@lemmy.worldlinkfedilinkarrow-up2·1 year agoThere’s no root login. It’s all containers.
There’s no way the model has access to that information, though.
Google’s important product must have proper scoped secret management, not just environment variables or similar.
There’s no root login. It’s all containers.
It’s containers all the way down!
All the way down.