• douglasg14b@lemmy.world
    link
    fedilink
    arrow-up
    3
    arrow-down
    3
    ·
    1 day ago

    Counter argument is that error codes and problem details can be used by attackers to reverse engineer and find exploitable parts of a system.

    Within reason anyways