that first source lists three methods that the bad guys infect snaps. this is one of them:
"The scammers have tried various approaches to appear legitimate:
Initially, they just published authentic-looking applications with plausible screenshots and storefront pages. This was the approach I documented in my previous articles about the fake “Exodus” and “Ledger Live” apps.
Then, they started evading text filters by using similar-looking characters from other alphabets. For example, replacing the lowercase “d” in “Ledger” with the Armenian letter Zhe “ժ”, which at first glance passes for a Latin “d”. They also use Palochka “ӏ” which resembles a lowercase “L”.
More recently, they’ve adopted a bait-and-switch approach:
Register an innocuous, unrelated snap name like lemon-throw, alpha-hub, or tenor-freeze
Publish something harmless - often claiming to be a game
Wait for approval
Push a second revision containing the fake crypto wallet app
Some of us in the community diligently report these applications to Canonical, and after a period they get removed."
the other methods were "domain squatting" and some kind of ping thing.
Over the years I never hear nothing about Flatpaks but I think they can be vulnerable too and always have. Tell you the truth I'm been too scared to poke around (research it) 'flatpak/cve' because I have to trust a few just to operate every day...
second link was startling too. big cve registry there..