Pulling down open source code as a dependency without ever reading the code and verifying that it doesn’t contain any backdoors or other malicious content has become one of the easiest ways to introduce malicious content into a code base.
All you have to do is this: Fix some code and create a pull request. Fix some more code, perhaps add a new feature, and create more pull requests. Upstream «rewards» you with commit access. Keep a low profile for a while longer. Make a few mistake to check how fast «mistakes» are discovered. Create some malicious code disguised as a bug, an honest programming mistake. Repeat.
Как часто вы смотрите исходный код программ, которые используете?