Hackers use credentials stolen in the GlassWorm campaign to access GitHub accounts and inject malware into Python repositories.
Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.