Main

processing priority

3

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2023-11-22 07:13:14

expired found date

-

created at

2024-06-04 22:10:20

updated at

2025-12-28 02:29:14

Domain name statistics

length

18

crc

47671

tld

2207

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

75337739

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

11462

mp size raw text

4011

mp inner links count

0

mp inner links status

20 (imported)

Open Graph

title

description

Some vulnerabilities are invisible. Rather than inserting logical bugs, adversaries can attack the encoding of source code files to inject vulnerabilities.

image

site name

author

updated

2025-12-15 16:57:13

raw text

Trojan Source Attacks You need to enable JavaScript to run this app. Trojan Source GitHub Read Paper Trojan Source Invisible Source Code Vulnerabilities Some Vulnerabilities are Invisible Rather than inserting logical bugs, adversaries can attack the encoding of source code files to inject vulnerabilities. These adversarial encodings produce no visual artifacts. #include #include int main() { bool isAdmin = false; /* begin admins only */ if (isAdmin) { printf("You are an admin.\n"); /* end admins only */ } return 0; } The trick The trick is to use Unicode control characters to reorder tokens in source code at the encoding level. These visually reordered tokens can be used to display logic that, while semantically correct, diverges from the logic presented by the logical ordering of source code tokens. Compilers and interpreters adhere to the logical ordering of source code, not the visual order. The attack The attack is to use control character...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

index version

2025110801

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

1

text characters

3123

text words

566

text unique words

284

text lines

80

text sentences

24

text paragraphs

7

text words per sentence

23

text matched phrases

11

text matched dictionaries

4

RSS

rss path

rss status

3 (priority 3 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap path

sitemap status

1 (priority 1 already searched, no matches found)

sitemap review version

1

sitemap urls count

0

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

-

sitemap process date

-

sitemap first import date

-

sitemap last import date

-