A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
Not ideal because it means extra work creating the placeholder (which can't be constant!) and makes people wonder if those placeholders are influencing their results. Fixing this makes #234 simpler.