<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Bitwarden | 今天abc看了啥🤔</title><description>现在我也不知道这频道发了啥了，各位慢慢吃瓜，将就着看联系我请去 @abc1763613206友链儿@cyberElaina@rvalue_daily@billchenla</description><link>https://channel.0w0.best</link><item><title>🔴 Bitwarden CLI 2026.4.0 被骇；请尽快更新并检查设备数据及修改密码（若适用）</title><link>https://channel.0w0.best/posts/7241</link><guid isPermaLink="true">https://channel.0w0.best/posts/7241</guid><pubDate>Thu, 23 Apr 2026 17:00:09 GMT</pubDate><content:encoded>&lt;i&gt;&lt;b&gt;🔴&lt;/b&gt;&lt;/i&gt; &lt;mark&gt;Bitwarden&lt;/mark&gt; CLI 2026.4.0 被骇；请尽快更新并检查设备数据及修改密码（若适用）。&lt;br /&gt;&lt;br /&gt;- 请更新至 &lt;mark&gt;Bitwarden&lt;/mark&gt; CLI 2026.4.1 或 降级至 2026.3.0。&lt;br /&gt;- 这是 &lt;mark&gt;Bitwarden&lt;/mark&gt; 的官方 CLI（难用的那个），和第三方 CLI rbw 无关。&lt;br /&gt;- 骇客似乎通过 GitHub Actions 潜入了 &lt;mark&gt;Bitwarden&lt;/mark&gt; 的 CI/CD pipeline。&lt;br /&gt;- 根据 Socket 分析，被骇软件的恶意行为包括收集系统凭据并将其加密发布到公开 GitHub repo 中，但不会在 locale 为 ru 的系统发作。&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://socket.dev/blog/bitwarden-cli-compromised&quot; target=&quot;_blank&quot;&gt;https://socket.dev/blog/bitwarden-cli-compromised&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;seealso: &lt;a href=&quot;https://news.ycombinator.com/item?id=47876043&quot; target=&quot;_blank&quot;&gt;HackerNews:47876043&lt;/a&gt;&lt;br /&gt;linksrc: &lt;a href=&quot;https://t.me/microblock_pub/2573&quot; target=&quot;_blank&quot;&gt;https://t.me/microblock_pub/2573&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;/search/%23Bitwarden&quot;&gt;#Bitwarden&lt;/a&gt; &lt;a href=&quot;/search/%23Ecosystem&quot;&gt;#Ecosystem&lt;/a&gt;&lt;a href=&quot;https://socket.dev/blog/bitwarden-cli-compromised&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Socket&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain ...&quot; src=&quot;/static/https://cdn4.telesco.pe/file/W-zYoZHVKOnqdztAEjnHCnK9wpN7fvA722Jsej5mC1Z7AvMGC9QRJD1EKwaTTpxIGkOlGaX_Em_mf4VCVdVnu0y7PG_R_J-2ztOFzL9huJsBsmj-EOHmHlqyZO-1BZJy64AA3pyO4z_voXs4ZT1Lt_HQbWI3vNzz3mXx1aicEim9fP36rZJcvPlsTRfpms-ozXgitQnYwP1F_UxYBtu84TA8sjeEeCidFSRsmmBBd29CbH57lC01woMlNU_JGKihLKVbTyEzPybQAj1HF8Mu_M15rO4u-2Fwhxlzy13Paph6mHQgNo6JoDrSFFddzwGV1dpiUgA43LdOV2gUUWvxVw.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;&lt;mark&gt;Bitwarden&lt;/mark&gt; CLI Compromised in Ongoing Checkmarx Supply Chain ...&lt;/div&gt;
  &lt;div&gt;&lt;mark&gt;Bitwarden&lt;/mark&gt; CLI 2026.4.0 was compromised in the Checkmarx supply chain campaign after attackers abused a GitHub Action in &lt;mark&gt;Bitwarden&lt;/mark&gt;’s CI/CD pipeline.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item></channel></rss>