Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

No rule is ironclad. I think matching risk to functionality is usually a good idea. For example, most modern Linuxen carry `rm` protected against root removal with `--no-preserve-root`. That is indeed `rm --wet-run` by a different name in the dangerous case.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: