Technology ❯ Cloud Computing ❯ Cloud Security ❯ Access Tokens
Leaked publisher tokens could let attackers push malicious updates to entire install bases across fragmented extension registries.