![](https://pbs.twimg.com/profile_images/2878353974/49ad2518e15d9e50f26b9ca8a883738b.jpeg)
owazbaba (2)
Last Login: April 03, 2023
Assessments
1
Score
2
owazbaba's Latest (1) Contributions
Sort by:
Filter by:
1
Technical Analysis
In other words, this vulnerability gives malicious actor the ability to create perfectly valid, perfectly malicious source code that could be used to create a novel supply-chain attack that can be carried out on source code.