• dieTasse@feddit.org
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    20 hours ago

    Yes, that is exactly how the axios supply chain attack worked… It ran post install script (on dependency) that downloaded malware, ran it and even cleaned it up. Everything on that machine was compromised… It can be any dependency of dependency too, deep down in the tree…

    • captcha_incorrect@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      11 hours ago

      Hmm. I was going to say that it sounds bonkers what it can run just any script, but at the same time, is it any different from downloading and executhing a binary file?