You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Mar 5, 2021. It is now read-only.
If one of the upstream providers injects malicious code, anyone who builds credulous from source will get it by default.
An alternative is to vendor upstream sources (by e.g. checking copies into this repo); this means that updates are pulled in by the Credulous team rather than automatically sent to anyone who builds from source.
The text was updated successfully, but these errors were encountered:
If one of the upstream providers injects malicious code, anyone who builds credulous from source will get it by default.
An alternative is to vendor upstream sources (by e.g. checking copies into this repo); this means that updates are pulled in by the Credulous team rather than automatically sent to anyone who builds from source.
The text was updated successfully, but these errors were encountered: