<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Bitwarden | 今天abc看了啥🤔</title><description>现在我也不知道这频道发了啥了，各位慢慢吃瓜，将就着看联系我请去 @abc1763613206友链儿@cyberElaina@rvalue_daily@billchenla</description><link>https://broadcastchannel-ajj.pages.dev</link><item><title>🔴 Bitwarden CLI 2026.4.0 被骇；请尽快更新并检查设备数据及修改密码（若适用）</title><link>https://broadcastchannel-ajj.pages.dev/posts/7241</link><guid isPermaLink="true">https://broadcastchannel-ajj.pages.dev/posts/7241</guid><pubDate>Thu, 23 Apr 2026 17:00:09 GMT</pubDate><content:encoded>&lt;i&gt;&lt;b&gt;🔴&lt;/b&gt;&lt;/i&gt; &lt;mark&gt;Bitwarden&lt;/mark&gt; CLI 2026.4.0 被骇；请尽快更新并检查设备数据及修改密码（若适用）。&lt;br /&gt;&lt;br /&gt;- 请更新至 &lt;mark&gt;Bitwarden&lt;/mark&gt; CLI 2026.4.1 或 降级至 2026.3.0。&lt;br /&gt;- 这是 &lt;mark&gt;Bitwarden&lt;/mark&gt; 的官方 CLI（难用的那个），和第三方 CLI rbw 无关。&lt;br /&gt;- 骇客似乎通过 GitHub Actions 潜入了 &lt;mark&gt;Bitwarden&lt;/mark&gt; 的 CI/CD pipeline。&lt;br /&gt;- 根据 Socket 分析，被骇软件的恶意行为包括收集系统凭据并将其加密发布到公开 GitHub repo 中，但不会在 locale 为 ru 的系统发作。&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://socket.dev/blog/bitwarden-cli-compromised&quot; target=&quot;_blank&quot;&gt;https://socket.dev/blog/bitwarden-cli-compromised&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;seealso: &lt;a href=&quot;https://news.ycombinator.com/item?id=47876043&quot; target=&quot;_blank&quot;&gt;HackerNews:47876043&lt;/a&gt;&lt;br /&gt;linksrc: &lt;a href=&quot;https://t.me/microblock_pub/2573&quot; target=&quot;_blank&quot;&gt;https://t.me/microblock_pub/2573&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;/search/%23Bitwarden&quot;&gt;#Bitwarden&lt;/a&gt; &lt;a href=&quot;/search/%23Ecosystem&quot;&gt;#Ecosystem&lt;/a&gt;&lt;a href=&quot;https://socket.dev/blog/bitwarden-cli-compromised&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Socket&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain ...&quot; src=&quot;/static/https://cdn4.telesco.pe/file/uboc8iYobfmiNTQdTtnjnlTf4MQbF6xKik96_SMUGwN01iOyhAgkTjFMbnJ2sowheUlg7G_G3NlJGPdD39TvrZ6DtWm0xmY85d6oyAvAFUVNrwF4DNgsy8Zw2LtX-APYKtI_XBrLoOtWbeJAZVik_Tv944uhZkpHG9xuhrK2aKSiS9xcEJmTQrL7WhQKsYNi0iug7C8y6CMbk2E3C4QAQqj3bGxdlSgdPXGO3jOrriHzlNM-8mY-Ph9CKpQXVm5YVDYlarO9M9AwdtM6fjCBQh_1uShWC_scM_yTs4BdW3FGLYLOsVqlvvJMI7GWJHbCpAQFVVZ4GWrrV-NXW4c2cA.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;&lt;mark&gt;Bitwarden&lt;/mark&gt; CLI Compromised in Ongoing Checkmarx Supply Chain ...&lt;/div&gt;
  &lt;div&gt;&lt;mark&gt;Bitwarden&lt;/mark&gt; CLI 2026.4.0 was compromised in the Checkmarx supply chain campaign after attackers abused a GitHub Action in &lt;mark&gt;Bitwarden&lt;/mark&gt;’s CI/CD pipeline.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item></channel></rss>