top | item 47136296

(no title)

noduerme | 5 days ago

This seems like a sensible thing to build if you're going to allow it to run on your actual machine, but... I'd like to hear more context about why it was allowed to run on a machine with your SSH keys, and how it tried to exfiltrate them, how you caught it doing so, etc.

discuss

order

No comments yet.