owazbaba (2)

Last Login: April 03, 2023
Assessments
1
Score
2

owazbaba's Latest (1) Contributions

Sort by:
Filter by:
1
Ratings
Technical Analysis

In other words, this vulnerability gives malicious actor the ability to create perfectly valid, perfectly malicious source code that could be used to create a novel supply-chain attack that can be carried out on source code.