There's a lot of this sort of thing out there
People blindly installing a package or whatever, without any checking what it actually does. Because the 'community' checks it, doesn't it. Except, no, the community frequently does not check it.
>> Instead, it's dynamically retrieved during installation, leaving no obvious trace in the source files.
>> PhantomRaven demonstrates how sophisticated attackers are getting at exploiting blind spots in traditional security tooling
I'd argue that some people just install things without checking. That will always be the case. It also makes a good case for outbound firewall rules, default to block, which would show a bit more of what is going on. Years ago, I read some uninformed advice who wrote you don't need to block outbound traffic because you have that 'under your control'. Nice.
Next up, .vimrc files using curl or git to install a load of nice-looking themes. But how many people check what it actually being downloaded?
Some people seem to equate 'developer' with being somehow a bit more clever. Some are, but there's a lot of 'copy from Stack Overflow' developers out there. See here: https://www.theregister.com/2025/09/29/postmark_mcp_server_code_hijacked/.