Event JSON
{
"id": "75bbf38c7ea6fbcbe380419fd32d92d48d9ac79e927fdd8b2f8058dc07877e95",
"pubkey": "16b3a799044e240aa9b9c89a7d168b0d27979db63021eee1157cd7bc0c6a8f47",
"created_at": 1730169327,
"kind": 1,
"tags": [
[
"t",
"netbsd"
],
[
"proxy",
"https://mstdn.social/@jschauma/113388377028070803",
"web"
],
[
"t",
"unix"
],
[
"proxy",
"https://mstdn.social/users/jschauma/statuses/113388377028070803",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://mstdn.social/users/jschauma/statuses/113388377028070803",
"pink.momostr"
],
[
"-"
]
],
"content": "You all know how `popen(3)` shells out and thus has been the cause of countless command injections, but did you also know that #NetBSD has `popenve(3)`, which uses `execve(2)` instead?\n\nhttps://man.netbsd.org/popenve.3\n\nSeriously, other #Unix versions should pick that up.",
"sig": "521939c39bd23305dd697de95f23abf928ce93e601b873e5ab1f0b05f21c1703858ccb56248cea18c7dac7db0fcbc0b2a2e07426ec4dfe4e1e5d1a0dd224948b"
}