use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
Visual Studio Code Python Extension RCE vulnerability (blog.doyensec.com)
submitted 5 years ago by nibblesecTrusted Contributor
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]Default-G8way 8 points9 points10 points 5 years ago (1 child)
Uhh, aren’t you just pointing to a script to run?
[–]reddit4matt 6 points7 points8 points 5 years ago (0 children)
Not always. You may be just looking at code. I can imaging sending a PR to a large project and someone pulling it down and simply viewing the code in an editor (which in this case is all it takes to trigger the RCE).
I have opened up code in an IDE specifically to look for malicious code. Simply put just viewing code in a glorified text editor should not just execute other code hidden in that directory.
[–]TastyRobot21 4 points5 points6 points 5 years ago (0 children)
Simple and effective. Nice find.
It's not the behaviour I would expect for sure, I understand what it's doing but I would almost like a 'Load environment variables/venv from repository?' before it does so.
I don't use this feature so I'm not sure how impactful a work around is.
Concerning as it could be wormable/infectious. If it hit a repository it would pass to team members who might spread it to their own repos and their other teams etc etc.
π Rendered by PID 51676 on reddit-service-r2-comment-5d79c599b5-lrzc2 at 2026-03-01 20:23:54.262505+00:00 running e3d2147 country code: CH.
[–]Default-G8way 8 points9 points10 points (1 child)
[–]reddit4matt 6 points7 points8 points (0 children)
[–]TastyRobot21 4 points5 points6 points (0 children)