On Tue, Jan 31, 2012 at 06:49:18PM +0000, James Tunnicliffe wrote:
Each build is run on a clean EC2 instance, so shouldn't worry about logins left behind from other activities. This certainly doesn't open us up to any more problems than a user who has write access to the box could cause any other way.
Right, but could some evil code be committed that can modify the configuration to fetch an external exploit and install it into the LEB?