Like BloodHound, except for long-game attacking a democracy.

[Insert John Lambert's "Defenders think in lists; attackers think in graphs" quote here]

@tychotithonus What is the centralization of Executive power if not an access control misconfiguration?
@mttaggart I need to dig up that "Remote root hole in the US Constitution" quote, I'm having trouble finding it

@tychotithonus Oh snap I just found this in /etc/constitution/config

CONSTITUTION=permissive
@mttaggart @tychotithonus I know it’ll be years before we can get a hot fix, let alone a proper update since we can’t get everyone to agree that this is a critical CVE based on a valid CWE (and, y’know, amendments are really slow)… any chance NIST or MITRE can recommend some mitigations in the meantime, or was their budget for that already cut?