No situation readily come to mind where an attacker could gain access to env vars but would not also have access to any other means of persistence.
No situation readily come to mind where an attacker could gain access to env vars but would not also have access to any other means of persistence.