Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It seems that PostHog just always loads the latest version of this piece of itself:

https://github.com/PostHog/posthog/issues/24471#issuecomment...

Though you can opt to bundle it yourself:

https://github.com/PostHog/posthog/issues/24471#issuecomment...



>> It seems that PostHog just always loads the latest version of this piece of itself:

Now there's a supply chain attack vector...


Years ago, IT at the company I was working at force-pushed a browser extension that did this same trick, but the extension vendor in question didn't even bother loading over https.

Edit: the extension's manifest gave it nearly every permission, on every web site, including internal ones


> I definitely want to figure out in detail what happened here so I can add a test to prevent a similar change in future!

Whoa! Good idea!

Could have been worse. At least the change didn't expose a hidden exploit.


Ouch. That just adds insult to injury.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: