Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If that’s your concern you should be auditing the script and the dependencies anyway, whether they’re in a lock file or in the script. It’s just as easy to put malicious stuff in a requirements.txt


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: