Trojan Source attack for introducing invisible vulnerabilities

1 · PVS-Studio blog · April 12, 2022, 3:01 p.m.
Researchers from the University of Cambridge described a technique that allows inserting invisible adversarial code in the reviewed source texts. The attack (CVE-2021-42574) is called Trojan Source. It is based on text formatting that makes the code look different for compilers/interpreters and human code reviewers....