(no title)
grodriguez100 | 24 days ago
An attacker can craft a skill which pulls dependencies and the dependencies themselves can be well behaved. The skill gets installed, works, gets popular, propagates. Then at some point the dependency is poisoned and turns into malware. A classic Trojan horse approach.
It is difficult to catch this with grep: there is a curl command but looks fine, the dependency looks fine as well etc. Until it doesn’t.
No comments yet.