3 pointsby sohimaster4 hours ago2 comments
  • sohimaster4 hours ago
    it checks for patterns derived from real AUR malware incidents:

        CHAOS RAT (2025) — browser impersonation packages, RAT distribution
        Google Chrome RAT (2025) — .install script, Python download+execute
        Acroread (2018) — orphan takeover, curl from paste service, systemd persistence
  • 4 hours ago
    undefined