On Wed, Feb 12, 2014 at 08:43:18AM -0500, Matthew Miller wrote: > > Technically doable but I'm curious, what use-case do you have in mind? > Looking for binaries, blobs, and archives that have crept in to the source. > Also, pretty charts. :)
Also, if combined with the full-text search, one could say "search in C and C++ source files" when looking for a known vulnerability. -- Matthew Miller -- Fedora Project -- <[email protected]> _______________________________________________ infrastructure mailing list [email protected] https://admin.fedoraproject.org/mailman/listinfo/infrastructure
