I’m tempted to publish an NPM package to do so as a joke, but I fear that it’d get used seriously
I’m tempted to publish an NPM package to do so as a joke, but I fear that it’d get used seriously
However it should be noted that the remote development connection is via their servers, which makes it somewhat less useful
I love that you’re thinking about how to secure sensitive parts of JS applications, however I wonder what threat this is guarding against. Can you give an example? Surely if an attacker can modify the source to call the sensitive functions, then they could modify the allow list
Thanks, now I want to order McDonald’s yellow coloured filament