Attackers could put the special files in .osc into the actual package sources (e.g. _apiurl). This allows the attacker to change the configuration of osc for the victim
{ "ubuntu_priority": "medium" }
{ "binaries": [ { "binary_name": "osc", "binary_version": "1.12.1-2" } ], "ubuntu_priority": "medium", "availability": "No subscription required" }