id
processing priority
3
site type
0 (generic, awaiting analysis)
review version
11
html import
20 (imported)
first seen date
2023-11-22 07:13:14
expired found date
-
created at
2024-06-04 22:10:20
updated at
2025-12-28 02:29:14
length
18
crc
47671
tld
2207
nm parts
0
nm random digits
0
nm rare letters
0
is subdomain of id
-
previous id
0
replaced with id
0
related id
-
dns primary id
dns alternative id
0
lifecycle status
0 (unclassified, or currently active)
deleted subdomains
0
page imported products
0
page imported random
0
page imported parking
0
count skipped due to recent timeouts on the same server IP
0
count content received but rejected due to 11-799
0
count dns errors
0
count cert errors
0
count timeouts
0
count http 429
0
count http 404
0
count http 403
0
count http 5xx
0
next operation date
-
server bits
—
server ip
-
mp import status
20
mp rejected date
-
mp saved date
-
mp size orig
11462
mp size raw text
4011
mp inner links count
0
mp inner links status
20 (imported)
title
description
Some vulnerabilities are invisible. Rather than inserting logical bugs, adversaries can attack the encoding of source code files to inject vulnerabilities.
image
site name
author
updated
2025-12-15 16:57:13
raw text
Trojan Source Attacks You need to enable JavaScript to run this app. Trojan Source GitHub Read Paper Trojan Source Invisible Source Code Vulnerabilities Some Vulnerabilities are Invisible Rather than inserting logical bugs, adversaries can attack the encoding of source code files to inject vulnerabilities. These adversarial encodings produce no visual artifacts. #include #include int main() { bool isAdmin = false; /* begin admins only */ if (isAdmin) { printf("You are an admin.\n"); /* end admins only */ } return 0; } The trick The trick is to use Unicode control characters to reorder tokens in source code at the encoding level. These visually reordered tokens can be used to display logic that, while semantically correct, diverges from the logic presented by the logical ordering of source code tokens. Compilers and interpreters adhere to the logical ordering of source code, not the visual order. The attack The attack is to use control character...
redirect type
0 (-)
block type
0 (no issues)
detected language
1 (English)
category id
index version
2025110801
spam phrases
0
text nonlatin
0
text cyrillic
1
text characters
3123
text words
566
text unique words
284
text lines
80
text sentences
24
text paragraphs
7
text words per sentence
23
text matched phrases
11
text matched dictionaries
4
links self subdomains
0
links other subdomains
links other domains
1 - srcf.net
links spam adult
0
links spam random
0
links spam expired
0
links ext activities
0
links ext ecommerce
0
links ext finance
0
links ext crypto
0
links ext booking
0
links ext news
0
links ext leaks
0
links ext ugc
2
links ext klim
0
links ext generic
0
dol status
0
dol updated
2025-12-15 16:57:13
rss path
rss status
3 (priority 3 already searched, no matches found)
rss found date
-
rss size orig
0
rss items
0
rss spam phrases
0
rss detected language
0 (awaiting analysis)
inbefore feed id
-
inbefore status
0 (new)
sitemap path
sitemap status
1 (priority 1 already searched, no matches found)
sitemap review version
1
sitemap urls count
0
sitemap urls adult
0
sitemap filtered products
0
sitemap filtered videos
0
sitemap found date
-
sitemap process date
-
sitemap first import date
-
sitemap last import date
-