← Back to context

Comment by discreteevent

5 months ago

What's the attack vector in this case? The Wasm is loaded from the file itself. If they can compromise the file then its cheaper to just compromise the data directly.

What I’m imagining is essentially a supply chain attack: The victim (mistakenly) trusts the attacker to supply an encoder. The encoder appears to function normally, but in fact will subtly leak information smuggled in decoded values of the victim’s data.

Far-fetched, indeed.

Providing an optional, optimized, native decoder which is much faster, but does something wicked when it sees the right data.