It absolutely shouldn’t be possible compromised or not for someone who has gained unlawful access to start pushing malicious code to production as long as proper security is in place
It shouldn’t be possible to break any service but hackers do that daily.
If proper security is in place they will need some 0day exploits, but it’s not impossible, just extremely difficult
It absolutely shouldn’t be possible compromised or not for someone who has gained unlawful access to start pushing malicious code to production as long as proper security is in place
It shouldn’t be possible to break any service but hackers do that daily. If proper security is in place they will need some 0day exploits, but it’s not impossible, just extremely difficult