gremlinz273
<Bronze Donator>
- 814
- 1,028
So I'm at a new contract job to write a mobile app for this large corporation. They have a preexisting api that was written for an inhouse app. The developer that wrote the api is no longer with the company and has gone home to India. So I'm digging through the api to figure out what is going on and if it is even suitable for what I need. I find a section of the code that looks strange, almost deliberately obfuscated, or less carefully written than other parts of the code. I dig further into to it find that is is accessible without going through any log in process and allows total access to the database without any auditing.
What should I do? Brave members of Rerolled screenshots help me decide how I should handle this dilemma.
I tempted to go tell the idiot boss what an idiot he is for blindly trusting outsourcers.
But who knows, for this company, it could be placed there for the NSA.
What do you boys think?
Just ignore it, collect phat paychek?
What should I do? Brave members of Rerolled screenshots help me decide how I should handle this dilemma.
I tempted to go tell the idiot boss what an idiot he is for blindly trusting outsourcers.
But who knows, for this company, it could be placed there for the NSA.
What do you boys think?
Just ignore it, collect phat paychek?