1000-ft view: these examples show what happens when you blindly trust updates, serialized input, remote configs, plugins, or CI/CD artifacts. The insecure flows skip hashes/signatures, allowlists, and safe formats — making supply-chain compromise trivial.
Why it’s bad: installing an update archive without verifying integrity lets attackers slip in modified binaries/scripts.
Why it’s bad: deserializing untrusted PHP payloads can trigger gadget chains and RCE.
O:8:"stdClass":1:{s:4:"pwn";s:3:"yes";}).Why it’s bad: pulling JSON from an arbitrary URL and applying it without integrity checks lets attackers rewrite app behavior.
src URL and load it — no signature/HMAC required.Why it’s bad: allowing arbitrary PHP uploads in webroot and including them directly is instant RCE.
.php file — the insecure loader will include it.Why it’s bad: deploying a build zip without a signed manifest/attestation enables supply-chain injection.