Technology ❯ Software Development ❯ Development Tools ❯ Extension Management
Leaked publisher tokens could let attackers push malicious updates to entire install bases across fragmented extension registries.