today's design problem:
if we let third-party binaries supply schemas, that means we need to execute them to get them to dump their schema which is a security issue, so we need to design a consent flow... => NO WE DON'T we can just SCAN THE BINARY for a given marker and exfiltrate the schemas without risking anything ๐
If you have a fediverse account, you can quote this note from your own instance. Search https://hachyderm.io/users/fasterthanlime/statuses/115917182482951077 on your instance and quote it. (Note that quoting is not supported in Mastodon.)