• paraphrand@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        1 day ago

        And it was live on the CS code plugin store for under an hour. It’s impressive to ensnare the operators of the platforms (plural) in such a small window.

    • [object Object]@lemmy.ca
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 day ago

      For what it’s worth, we are living close to the movie Hackers, complete with turning tankers upside down and a new RCE/LPE a day lately.

        • Thinker@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          14 hours ago

          Local Privilege Escalation - i.e. someone who is already a non-admin user (whether through other hacks or normally) on your computer getting admin privileges.

      • etherphon@piefed.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 day ago

        I suppose it’s just the culture that’s just kind of flat, I thought it would be more universal but everyone is in their own bubbles so it’s fractured all over the place, which is neat for the niches but there’s no glue.

  • Kiernian@lemmy.world
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    1 day ago

    I wonder who made the list of “don’t touch these repos, they’re propping up our proprietary software sans attribution” for the LLM injectabots to avoid.

    I realize that the end game here is SUPPOSED to be “erode all trust in free software” but the ineptitude of those profiting off of proprietary software is such that they WILL fuck this up in such a way that it hurts themselves too, it’s just a matter of when.

  • A_norny_mousse@piefed.zip
    link
    fedilink
    English
    arrow-up
    8
    ·
    edit-2
    1 day ago

    The way I’m reading the article, this is mostly a Github thing:

    The malware allows TeamPCP’s hackers to steal credentials (on github) that let them publish malicious versions of those software development tools, too (on github). The cycle repeats, and TeamPCP’s collection of breached networks grows.