Close that shady forum tab. Walk away from the .zip file. And if you absolutely must run that decoder, do it on a computer that has never, ever seen a production credential, a Git push, or a saved password.

You see, the decode.php file was a Trojan horse. The actual decoder engine was a legitimate, cracked version of a real commercial tool—that part worked flawlessly. But embedded in its PHP parser was a hidden eval() that, after decryption, reached out to a dead-drop IP (which Alex had blocked, remember?), but more cleverly, it scanned Alex's local .bash_history , .git/config , and ~/.ssh/id_rsa .

Alex didn't have the license key. The original developer was unreachable. The client was frantic.