▲ | 27theo 3 days ago | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scary. I saw a tweet the other day from a job seeker who had been sent a repo of seemingly trustworthy code. The sender claimed to be working with a team that was hiring, or something along those lines. Of course, one file deeply nested within the folds of the project contained a block of obfuscated JavaScript designed to grab as much data from the job seeker as possible and transmit it elsewhere. Had the job seeker run the project without reading through it first, they would have been in hot water. You can imagine some variant of this attack including a carefully designed Emacs Lisp payload, which the unsuspecting and desperate-for-a-job victim might open in Emacs. Surprising that the Emacs maintainers didn't fix it as quickly as you'd hope. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
▲ | medo-bear 3 days ago | parent [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Emacs doesn't market itself as a sandboxed tool. It is purpose built to give users unrivaled powers. There are obvious consequnces to this. What is more scary is running untrusted js in a browser that has been marketed as sanboxed, but you probably do this all day every day | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|