Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Maybe it's a lack of imagination on my part, but how do spammers abuse self-hosted runners?


Form submission spam. Unique/'untraceable' IPs...


How do they abuse self hosted runners?


Malware in build scripts/dependencies. That's not exclusively credential/crypto-stealers, there's apparently also a healthy demand for various types of spam straight from corpo gateways...


Yes, but they’re self hosted




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: