Comment by necovek
19 days ago
Yeah, there are ways to reduce the impact (as a sibling comment mentioned, typos or commands missing on a system could still be used to trick the operator), but I was mostly explaining the attack vector in case it is present in the PATH.
No comments yet
Contribute on Hacker News ↗