re: What's your spookiest coding story? VIEW POST

FULL DISCUSSION
 

What about "endemic" stack traces in production logs?

A password that when entered with any of the e-mail addresses lets you impersonate that user..

A 10+ years old codebase with no test coverage at all..

APIs with no authentication and only the thin protection of a VPN..

Millions of personal records stored and processed without the user consent..

code of conduct - report abuse