"Rather than inserting logical bugs, adversaries can attack the encoding of source code files to inject vulnerabilities.
These adversarial encodings produce no visual artifacts.
The trick is to use Unicode control characters to reorder tokens in source code at the encoding level."