Vorpal ,

Yes, obviously there are more ways to hide malicious code.

As for the git commit ID, I didn't see you using it even when it was available though? But perhaps that could be a weakness, if the commit ID used does not match the tag in the repo, that would be a red flag too. That could be worth checking.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • rust@lemmy.ml
  • test
  • worldmews
  • mews
  • All magazines