Research payload - Snapcraft plugin for publisher mutation
Direct local Snapcraft CLI vector.
Contains malicious plugin that attempts publisher username mutation
when loaded during build on a machine with Launchpad credentials.
For authorized bug bounty research only.
(Ownership verified)
The publisher has verified that they own this domain.
It does not guarantee the Snap is an official upload
from the upstream project.
Snaps are applications packaged with all their dependencies to run on all popular Linux distributions from a single build. They update automatically and roll back gracefully.
Snaps are discoverable and installable from the Snap Store, an app store with an audience of millions.
For versions of Ubuntu between 14.04 LTS (Trusty Tahr) and 15.10 (Wily Werewolf), as well as Ubuntu flavours that don’t include snap by default, snap can be installed from the Ubuntu Software Centre by searching for snapd.
Alternatively, snapd can be installed from the command line:
sudo apt update
sudo apt install snapd
Either log out and back in again, or restart your system, to ensure snap’s paths are updated correctly.
Install rviani8
To install rviani8, simply use the following command: