▲ | cube00 3 days ago | |
postinstall is running on the developer's machine, from an endpoint security perspective, it's the actual developer performing the malicious actions, their machine, their IP address and their location. | ||
▲ | deevus 2 days ago | parent [-] | |
That's a good point. Thanks |