• 7heo@lemmy.ml
    link
    fedilink
    arrow-up
    56
    arrow-down
    1
    ·
    8 months ago

    This doesn’t pass the smell test.

    • Instructs to pipe the output of curl in sh
    • Assumes that sh is bash [1]
    • “Community” behind it is apparently originating in Berlin, and is now a “nonprofit foundation in Switzerland”, but has no publicly disclosed legal structure anymore.
    • “Community” behind it uses discord, but not revolt, matrix, simplex or others.
    • “Community” behind it uses twitter, but not mastodon.
    • Cryptobros.

    1. sh <(curl -sSf https://url.redacted/script) ↩︎

    • CrinterScaked@sh.itjust.works
      link
      fedilink
      arrow-up
      14
      arrow-down
      9
      ·
      8 months ago

      Installing by piping from curl is pretty common and not a red flag in and of itself. Even Rust is installed this way. If you don’t trust the URL, you also shouldn’t trust any binary installers downloaded from that website.

      • corsicanguppy
        link
        fedilink
        arrow-up
        15
        arrow-down
        3
        ·
        8 months ago

        Installing by piping from curl is

        Toxic. Speaking as someone who was security chief at an OS, what you meant to say was ‘toxic’.

        Given its insidious nature, though, ‘venomous’ may be a good alternate.

            • asudox@lemmy.world
              link
              fedilink
              arrow-up
              3
              ·
              8 months ago

              Crates is insecure

              And? You are literally installing someone else’s code. The compiler isn’t an AV. This is true for all langs.

              piping curl to bash for installing rust Dev tools

              How is it any different than installing binaries from the site and just pulling the binary via curl? The bash script is also visible to anyone, feel free to check it for anything that might be malicious.

              • delirious_owl@discuss.online
                link
                fedilink
                arrow-up
                1
                ·
                8 months ago

                Trust is a thing. We should trust the person writing our dependencies and be able to verify that it was published by them, and not somebody in the middle maliciously altering the code.

                You should not be installing unsigned binaries from a website. Either use a package manager that checks for signatures or manually check the signatures yourself. If the project doesn’t sign their releases, open a bug report.

        • pcouy@lemmy.pierre-couy.fr
          link
          fedilink
          arrow-up
          2
          ·
          8 months ago

          Can you elaborate?

          I was under the impression that there was some kind of consensus around rust being one of the safest languages to use. However, I’ve seen comments about rust being bad pop up in a few threads lately but they never explain why they think so.

          • delirious_owl@discuss.online
            link
            fedilink
            arrow-up
            2
            ·
            edit-2
            8 months ago

            You’re talking about using the language and preventing errors. That’s less about security and more about preventing errors.

            I’m talking about the supply chain, watering hole attacks, etc. Crates does not cryptographically verify the authenticity or anything that it downloads.

            The only language that I’m aware of that has a dependency manager that has cryptographic auth of everything it downloads is Java’s Maven. Everything else is vulnerable, rust included.