owazbaba (2)
Last Login: April 03, 2023
Assessments
1
Score
2
owazbaba's Latest (1) Contributions
Sort by:
Filter by:
1
Technical Analysis
In other words, this vulnerability gives malicious actor the ability to create perfectly valid, perfectly malicious source code that could be used to create a novel supply-chain attack that can be carried out on source code.