▲ | Yeroc 3 hours ago | |
There are things that are potentially possible such as templating pom.xml build files or adjusting dependencies based on user properties (this that what you're suggesting?), but what you're describing is definitely not normal, or best practice in the ecosystem and shouldn't be presented as if it's normal practice. | ||
▲ | lucideer an hour ago | parent [-] | |
Attackers don't need these practices to be normal, they just need them to be common enough (significant minority of) |