Malicious attackers can spend tons of time trying to find vulnerabilities, yes, but an ARMY of people also has access to the code and wants it to stay safe, so they do the same thing and also patch any holes they find.
“Practicing” attacks isn’t really a thing, and even if it was, you wouldn’t need the source code to do it because you would be breaking into the version that’s actually running, not the decompiled version.
Latest Answers