The only thing I can think that would be possible and worth someone's time would be to change the code and make it malicious.

So if I comprimised a dev and quietly waited until the dev makes a change, forcing people to upgrade, to replace the code with my malicious code.. that might work best.

Reply to this note

Please Login to reply.

Discussion

No replies yet.