I set up a quick demonstration to show risks of curl|bash and how a bad-actor could potentially hide a malicious script that appears safe.

It’s nothing new or groundbreaking, but I figure it never hurts to have another reminder.

  • mrnobody@reddthat.com
    link
    fedilink
    English
    arrow-up
    8
    ·
    18 hours ago

    The reality is a lot of newcomers to Linux won’t even understand the risks involved, it’s run because that’s what they’re told or shown to do. That’s what I did for pihole many years ago too, I’ll admit

    • BluescreenOfDeath@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      29 minutes ago

      Users are blameless, I find the fault with the developers.

      Asking users to pipe curl to bash because it’s easier for the developer is just the developer being lazy, IMO.

      Developers wouldn’t get a free pass for taking lazy, insecure shortcuts in programming, I don’t know why they should get a free pass on this.

    • atzanteol@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      6
      ·
      17 hours ago

      I’ve been accused of “gate keeping” when I tell people that this is a shitty way to deploy applications and that nobody should do it.