level or have something installed in the VM that modifies it and adds the tokens? But it beats all logic when I see the network calls to outposts
They don't hijack anything. It's an identity provider. And it's internal to their infra.
Обсуждают сегодня