Skip to content

Remote hacking #15

@mbrock

Description

@mbrock

What kind of protocol do we need for remote hacking?

  • evaluating code and receiving the results
  • handling remote errors with restarts etc
  • redirecting output streams

This would be enough for e.g. live hacking a server application.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions