On Wed, Feb 12, 2014 at 08:43:18AM -0500, Matthew Miller wrote:
> > Technically doable but I'm curious, what use-case do you have in mind?
> Looking for binaries, blobs, and archives that have crept in to the source.
> Also, pretty charts. :)

Also, if combined with the full-text search, one could say "search in C and
C++ source files" when looking for a known vulnerability.


-- 
Matthew Miller    --   Fedora Project    --    <[email protected]>
_______________________________________________
infrastructure mailing list
[email protected]
https://admin.fedoraproject.org/mailman/listinfo/infrastructure

Reply via email to