Backdoors in Source Code

The cluster discusses the limitations of code reviews and open source transparency in detecting subtle backdoors, referencing Obfuscated C and Underhanded C contests, supply chain attacks, and compromised toolchains.

➡️ Stable 0.7x Security
2,615
Comments
20
Years Active
5
Top Authors
#4386
Topic ID

Activity Over Time

2007
1
2008
2
2009
18
2010
45
2011
62
2012
69
2013
132
2014
111
2015
167
2016
159
2017
168
2018
158
2019
128
2020
200
2021
244
2022
190
2023
212
2024
282
2025
251
2026
16

Keywords

UC MS e.g DOS CCC TrueCrypt GitHub microsoft.com PDF TC code source code backdoor source signature malware malicious binary contest hide

Sample Comments

adrianN Mar 28, 2019 View on HN

The obfuscated C coding contest shows that you probably won't catch backdoors with code reviews

evgen Apr 8, 2016 View on HN

Perhaps by knowing that the distributed binaries will be disassembled and inspected? The same way it would have to be examined even if there was a GitHub repo out there claiming to be the code used?

rosstafarian Jun 5, 2012 View on HN

Yes but some one can break into whatever server is hosting the source and add a backdoor withought anyone noticing for quite a while, do you go through all the code you compile? Can't think of any specific examples right now but i remember this happening a few times

bestdayever Mar 7, 2014 View on HN

Why would they need to interrogate him, they could just look at the source code. Not to mention they could easily get a plant as a contributor and work in back door code (probably already happened)

Fredkin Jun 3, 2025 View on HN

Yes and even if they were squeaky clean and didn't do anything bad with your code, there's also the possibility that they've been hacked and code is getting siphoned off somewhere.

dTal Sep 28, 2016 View on HN

Are you familiar with the Underhanded C Contest? It's possible to maliciously tamper with C code such that you definitely wouldn't spot it with a cursory glance over, and possibly even with careful study.

jrowley Jan 13, 2017 View on HN

You might be able to disguise it as debugging/development code that was mistakenly left in there. And instead of a hardcoded list of targets it could pull down the values in a more creative way. But at the end of the day that probably wouldn't stop a talented reverse engineer from figuring out what was going on.

thaumasiotes Feb 25, 2014 View on HN

Hypothetically, if someone integrated this into their own proprietary app with hidden code under a proprietary license... how would you know it hadn't been compromised?

dotancohen Jan 4, 2025 View on HN

I suggest looking into the Obfusicated C contest before relying on your own reading of code to verify lack of malicious intent.

majewsky Jul 16, 2023 View on HN

This sounds like a really good idea... if you want to hide subtle backdoors in innocuous-looking code.