OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users from legitimate sign‑in pages to attacker‑controlled infrastructure.
A management console (manage.py) is included for managing all maps in the cluster. Scripts for starting all, stopping all, updating, backing up user data, and restoring user data are included for ...