4 points | by Ada-Ihueze 21 hours ago
3 comments
Situation: I gave something full access to act on my behalf.
Problem: The thing now has full access to act on my behalf.
Why so many words to describe an obvious problem?
Sounds like a fun project, but something easily mitigated. I have written my own to integrate with various providers. This attack vector is a concern for someone that builds something simple and then just releases it into the wild.
Situation: I gave something full access to act on my behalf.
Problem: The thing now has full access to act on my behalf.
Why so many words to describe an obvious problem?
Sounds like a fun project, but something easily mitigated. I have written my own to integrate with various providers. This attack vector is a concern for someone that builds something simple and then just releases it into the wild.