On Wed, Feb 12, 2014 at 08:43:18AM -0500, Matthew Miller wrote: > > Technically doable but I'm curious, what use-case do you have in mind? > Looking for binaries, blobs, and archives that have crept in to the source. > Also, pretty charts. :) Also, if combined with the full-text search, one could say "search in C and C++ source files" when looking for a known vulnerability. -- Matthew Miller -- Fedora Project -- <mattdm@xxxxxxxxxxxxxxxxx> _______________________________________________ infrastructure mailing list infrastructure@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/infrastructure