• lily33@lemm.ee
    link
    fedilink
    arrow-up
    25
    ·
    4 months ago

    Finally, presumably if anyone added some malicious code in a their program, it would be sneaky and not obvious from quickly reading the code.

    • Norgur@kbin.social
      link
      fedilink
      arrow-up
      38
      ·
      4 months ago

      I’d expect them to properly comment it with “#-------Begin malicious shit--------”.
      COMMENT YOUR CODE, PEOPLE!

      • lily33@lemm.ee
        link
        fedilink
        arrow-up
        14
        ·
        edit-2
        4 months ago

        Oh, in that case we don’t need to read either - just run a simple grep!

        • Norgur@kbin.social
          link
          fedilink
          arrow-up
          11
          ·
          4 months ago

          Those malicious coders are too sly for that. Some write “Sh1t” to throw grep off, others even do a “B3g1n”… They are always one step ahead!

          • lily33@lemm.ee
            link
            fedilink
            arrow-up
            5
            ·
            4 months ago

            Good point. I’d try to grep for something like [Bb3][Ee3]g[Ii1][nη]\w+<and so on> but I just know I’ll miss something

    • banazir@lemmy.ml
      link
      fedilink
      arrow-up
      12
      ·
      4 months ago

      Well yeah, the recent xz vulnerability was not present in the source code at all. Any amount of code reading would not have caught that one.

      • Successful_Try543@feddit.de
        link
        fedilink
        arrow-up
        3
        ·
        edit-2
        4 months ago

        Wasn’t the problem that it the backdoor was not present in the source code on GitHub, but was in the source tarball? So as long as one reads the code that one actually builds from should be fine.

        • SuperIce@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          ·
          4 months ago

          A line of code that enables the backdoor was out present in the tarball. The actual code was obfuscated within an archive used for the unit testing.