tl;dr
Tutorial API Endpoint delivers unknown code (hidden between filler text):
- https://odyssey-lift-off-rest-api.herokuapp.com/tracks → description field (startig with element 2)
Hello, I was just following “Lift-off III: Arguments” section 8, when I noticed some strange code displayed on the resulting page (see attached screenshot).
Apollo will fetch the data via RESTful-API mentioned in the tutorial, the strange code is “hidden” between some dummy text in the description field:
- https:// odyssey-lift-off-rest-api.herokuapp.com/track/c_2
(Use the link from “tl;dr” to receive all occurences)
Could this code be potential exploit code? Or is it just a bad joke (considering the huge amount of buzzwords):
php, printer, vfat_interface_malware, rosetta_social_log.mail, mnemonic, mysql, virus_truncate_bit, honeypot_burn, kernel, microphoneError, zip, exploit_optic_source, certificate, architecture_dbms, tcp, encryption, protocol_pdf, bloatware, paste_driver, processIrc, backsideCopyDatabase.servicesApi, cifs_matrix_filename, monitor_blacklist_constant, antivirus, camera.truncate, vpn_template, opengl_piracy_memory, vaporware, backsideDatabase, lockMicrophone, installQueue, bridge_wep_wizard.file_zip_graymail.tunnelingCycleHome, sdram_hacker, debug, irq_bittorrent_dos, xslt.dac_vector