← Back to context

Comment by lmm

7 hours ago

> Is ssh somehow sacrosanct in a way that any other RCE or credential stealing attack is different?

I see ssh as a very fundamental part of the system - in BSD terms it's in base not ports. Random packages from npm or pypi, sure, if you installed some slop off the internet and got exploited that's not so surprising. (Even those package managers themselves are not part of the base system, much less anything you install with them). But ssh should be safe!