| ▲ | vitus 4 hours ago | ||||||||||||||||
Looks like the repo owner force-pushed a bad commit to replace an existing one. But then, why not forge it to maintain the existing timestamp + author, e.g. via `git commit --amend -C df8c18`? Innocuous PR (but do note the line about "pedronauck pushed a commit that referenced this pull request last week"): https://github.com/pedronauck/reworm/pull/28 Original commit: https://github.com/pedronauck/reworm/commit/df8c18 Amended commit: https://github.com/pedronauck/reworm/commit/d50cd8 Either way, pretty clear sign that the owner's creds (and possibly an entire machine) are compromised. | |||||||||||||||||
| ▲ | chrismorgan 4 hours ago | parent [-] | ||||||||||||||||
The value of the technique, I suppose, is that it hides a large payload a bit better. The part you can see stinks (a bunch of magic numbers and eval), but I suppose it’s still easier to overlook than a 9000-character line of hexadecimal (if still encoded or even decoded but still encrypted) or stuff mentioning Solana and Russian timezones (I just decoded and decrypted the payload out of curiosity). But really, it still has to be injected after the fact. Even the most superficial code review should catch it. | |||||||||||||||||
| |||||||||||||||||