← Back to context Comment by taherm789 1 day ago It's not? The code is all obfuscated, the author wrote it for us to demonstrate what's happening. 1 comment taherm789 Reply Etheryte 1 day ago The author specifically calls it out in the post, no?> They also left helpful comments in their code marking the malicious sections - professional development practices applied to supply chain attacks. Someone probably has a Jira board for this.
Etheryte 1 day ago The author specifically calls it out in the post, no?> They also left helpful comments in their code marking the malicious sections - professional development practices applied to supply chain attacks. Someone probably has a Jira board for this.
The author specifically calls it out in the post, no?
> They also left helpful comments in their code marking the malicious sections - professional development practices applied to supply chain attacks. Someone probably has a Jira board for this.