•
I forget the actual term but there is a concept of coding that similar to how a binary poison works. You need two pieces of code that seem very dissimilar to each other to make it work. The code added would appear to look legit but in reality it's use would make another part of the code vulnerable so yes, I suspect this code was meant to engineer a vulnerability or some unseen functionality for some nefarious purpose.
I forget the actual term but there is a concept of coding that similar to how a binary poison works. You need two pieces of code that seem very dissimilar to each other to make it work. The code added would appear to look legit but in reality it's use would make another part of the code vulnerable so yes, I suspect this code was meant to engineer a vulnerability or some unseen functionality for some nefarious purpose.
(post is archived)