static, 7 months ago xz was successful because it was believable, but a malicious actor would more likely target libraries that are depended on by many, like xz.
xz was successful because it was believable, but a malicious actor would more likely target libraries that are depended on by many, like xz.