Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.
Hackers use credentials stolen in the GlassWorm campaign to access GitHub accounts and inject malware into Python repositories.