Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Heck ya! I can’t wait to try it in whatever my next project is.

I’d like to learn more about the security of the functionality. I’m not talking about how to apply pg roles/privs/RLS, but rather my perceived risk of how hard it is to write stuff safely in C. That is, who is handling inbound http requests, pg or the extension? What confidence do I have that my db mem is safe from imperfect extension logic?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: