• dieTasse@feddit.org
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    15 hours ago

    Yes, that is exactly how the axios supply chain attack worked… It ran post install script (on dependency) that downloaded malware, ran it and even cleaned it up. Everything on that machine was compromised… It can be any dependency of dependency too, deep down in the tree…