This is a common but untrue belief. It’s a fundamental axciom of software security that you can’t trust source, so you must diagnose the binary.
Source may be helpful, but in the grand scheme of things lots of other properties are more important.
What if you trust the build tool chain and can reproduce the binary from source?
This is a common but untrue belief. It’s a fundamental axciom of software security that you can’t trust source, so you must diagnose the binary.
Source may be helpful, but in the grand scheme of things lots of other properties are more important.