Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's if you're using on the server side, all packages/dependencies included and running on your nodejs-backend have full access to your network and filesystem, even if it's just a css styles library, if updated it there's no permissions stopping it from grabbing files or monitoring the network.

Instead of wrapping security layers around it ourselves with docker, selinux configs etc, it's safer to let gcp or aws filter that out for you because they're likely to have way better security.

Serverless ( there's still servers/containers ) just means that you don't touch the devops and scaling. You can still have your DB and APIs separately in order to be cost effective.

In your case your servers are not using node on the backend to run the servers thus you don't have this vulnerability.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: