Home Artists Posts Import Register

Content

The response so far has been mostly that the risk is covered by the warnings, but it will get looked into and might be patched. Hopefully it will. If it will not be patched at the very least I'll let you guys know what to look for exactly and avoid. Maybe I'll do a var scanner of sorts that flags suspicious plugins or maybe one of the dudes that do addon manager plugins will be kind enough to do it.

WHAT YOU SHOULD KNOW

- if you have any personal information or sensitive documents,photos in vam (vam folders), it could be sent very easily and silently to a 3rd party over the internet, even if you have vam browser as off and all that. I would not have the internet on in that case or I would just block VAM in the firewall
- I think it could be used for the usual malicious reasons: crypto mining or other mining in the background (60% sure),  using your computer in a botnet for DDoS attacks (100% sure), blackmail obviously, remote-view (kind of and low quality) & remote-commands in VAM to scare the crap out of you (90% sure); I don't think it could be used to install viruses, delete important stuff or anything like that, just mess up with your VAM or within VAMs limitations
- the good news is that it's pretty obvious in the code and hard to hide and there have been no reports of it being used so far from what I can tell, so I wouldn't worry too much about it. But I wanted to let you guys know just in case. Better safe than sorry!

Comments

Dakoto

Thanks for the heads-up, it'll be cool if you share a var-scanner to help us avoiding the worst

thomas d

I agree, there are a lot of good 3rd party resources.

SPQRAeternum

I'll wait a bit to see if maybe VAM gets updated which would be the ideal outcome, they said they'll look into it and might do it. If it's not going to be and there are no signs that it's gonna be, I'll make some update then