• ramjambamalam@lemmy.ca
    link
    fedilink
    arrow-up
    13
    ·
    2 months ago

    We and the hacker have no idea if this list is config driven or truly “hard coded” i.e. a const in the source code. It’s hardly an indicator of violating a core programming tenet.