← Back to context Comment by alphager 19 hours ago Name a few. 3 comments alphager Reply TylerE 17 hours ago https://en.wikipedia.org/wiki/XZ_Utils_backdoorhttps://medium.com/@aleksamajkic/fake-sms-how-deep-does-the-...https://blog.linuxmint.com/?p=2994https://www.bleepingcomputer.com/news/linux/malicious-packag...https://www.cnx-software.com/2021/04/22/phd-students-willful...I could go on but I trust this is a sufficient number of examples. pona-a 4 hours ago Only two of these were actual malicious commits. Two others were malware inserted into the repositories (if Twitter could be thought of as a meta-repo), which is bad but not on the same scale.
TylerE 17 hours ago https://en.wikipedia.org/wiki/XZ_Utils_backdoorhttps://medium.com/@aleksamajkic/fake-sms-how-deep-does-the-...https://blog.linuxmint.com/?p=2994https://www.bleepingcomputer.com/news/linux/malicious-packag...https://www.cnx-software.com/2021/04/22/phd-students-willful...I could go on but I trust this is a sufficient number of examples. pona-a 4 hours ago Only two of these were actual malicious commits. Two others were malware inserted into the repositories (if Twitter could be thought of as a meta-repo), which is bad but not on the same scale.
pona-a 4 hours ago Only two of these were actual malicious commits. Two others were malware inserted into the repositories (if Twitter could be thought of as a meta-repo), which is bad but not on the same scale.
https://en.wikipedia.org/wiki/XZ_Utils_backdoor
https://medium.com/@aleksamajkic/fake-sms-how-deep-does-the-...
https://blog.linuxmint.com/?p=2994
https://www.bleepingcomputer.com/news/linux/malicious-packag...
https://www.cnx-software.com/2021/04/22/phd-students-willful...
I could go on but I trust this is a sufficient number of examples.
Only two of these were actual malicious commits. Two others were malware inserted into the repositories (if Twitter could be thought of as a meta-repo), which is bad but not on the same scale.