

The LSPs load when you open a file in nvim, so I think it would be a child process? Is there any way to check what environment variables a process has, like with gdb or something else?
The LSPs load when you open a file in nvim, so I think it would be a child process? Is there any way to check what environment variables a process has, like with gdb or something else?
I forgot to mention I’ve been doing that, I’ll update the post
You don’t need to have access to the source code (reverse engineered or not) to find security holes. However, people need to audit the source code to prove it’s secure.
So, closed source software is maybe slightly harder to find flaws in for a malicious actor, but significantly harder for users to audit (because you have to rely on the word of the company publishing the software, or a 3rd party security auditing company, or reverse engineer the code yourself)
Additionally, it’s harder for malicious actors to hide the existence of vulnerabilities they find. They can’t just not tell anyone what they find because the code is all public anyway. If people are looking at it frequently enough (i.e. if the project is still active), someone else will probably notice it as well.
Ubuntu 18.04 (2018) -> Manjaro (2019-2021)-> Arch (2021-2022) ->EndeavourOS (2022-present on my desktop) ->NixOS (2024-present on my laptop)
The irony of this meme being posted from a platform written in rust is pretty great ngl
I’m actually using CMake for this project (I just haven’t moved it over from my system config yet) so I was able to set an environment variable to get that successfully. Is there a specific place I need to put the json to get clangd to recognize it?
It would probably work if I used the python script from the other project but I want to try getting it working directly first.