top | item 46363682 (no title) taherm789 | 2 months ago It's not? The code is all obfuscated, the author wrote it for us to demonstrate what's happening. discuss order hn newest Etheryte|2 months ago The author specifically calls it out in the post, no?> They also left helpful comments in their code marking the malicious sections - professional development practices applied to supply chain attacks. Someone probably has a Jira board for this.
Etheryte|2 months ago The author specifically calls it out in the post, no?> They also left helpful comments in their code marking the malicious sections - professional development practices applied to supply chain attacks. Someone probably has a Jira board for this.
Etheryte|2 months ago
> They also left helpful comments in their code marking the malicious sections - professional development practices applied to supply chain attacks. Someone probably has a Jira board for this.