Trust, but always verify. You are not immune.
Never, EVER, do anything security related while sleep deprived, drunk, high, having sex, or all of the above.
After that… no, don’t trust. Zero trust.
There are basic hygiene measures to run anything related to any exploit — including “just” PoCs — depending on how risky a total pwn would be:
- container
- VM
- separate machine
- airgapped
- airgapped in a faraday cage (tinfoil works wonders to kill WiFi, a cheap DBV stick turned SDR is great for making sure).
Reading through the code is nice, and should be done anyway from an educational point of view… but even when “sure”, basic hygiene still applies.
Keeping tokens in one VM (or a few), while running the exploit in another, is also a good idea. Stuff like ”Windows → WSL2 → Docker", works wonders (but beware of VSCode’s pass-through containers). Bonus points if passkeys and a fingerprint reader get involved. Extra bonus points for logging out before testing (if it asks to unlock any passkey… well, don’t), then logging out again afterwards.
What I’m not so sure about, is deleting the siphoned data without alerting the potential victims. Everyone kind of failed at security, but still. A heads up to rotate all keys, would be nice.
Deceptichum@quokk.au 1 day ago
I feel like PoC wasn’t the most clarifying of initials for a title here.
Penguincoder@beehaw.org 1 day ago
Sorry for that, this is the technology community though. PoC in tech has a different meaning than others, being Proof of Concept. Each community or in groups have their own acronyms even if it overlaps others. I did not think that acronym in this context needed clarification.