I think what is being suggested that if the sec team bans all applications that 
exhibit dynamic code loading behavior they’d be safer - which would catch a lot 
of apps in the net. 

> On Aug 23, 2022, at 10:44 AM, Brian Candler <b.cand...@pobox.com> wrote:
> 
> 
>> On Tuesday, 23 August 2022 at 15:30:49 UTC+1 Gopher-Insane wrote:
>> The issue is not a vulnerability in the language itself but the use of that 
>> language to embed malware so AV signatures do not detect it. The feeling is 
>> that our InfoSec will be wanting to restrict obscure languages (Go, Rust 
>> etc...).
> 
> And how exactly does choosing not to use Go/Rust in your own organization, 
> avoid you from getting infected by malware written in Go/Rust?
> 
> -- 
> You received this message because you are subscribed to the Google Groups 
> "golang-nuts" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to golang-nuts+unsubscr...@googlegroups.com.
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/golang-nuts/a465a7ff-3e13-458d-a7f8-61c0375c38a7n%40googlegroups.com.

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/golang-nuts/CD882B25-875C-48BF-9AC2-C3E003B38451%40ix.netcom.com.

Reply via email to