winstonwinston 37 minutes ago
The alternative is to run something like rpm -i from_url.rpm to install some package directly. Which is not exactly any different from security perspective.
There is no easy way around this when the software is not in a system repo or without attestation in some way.
late_night_fix an hour ago
akagusu an hour ago
Nobody is forcing anyone to execute the script and usually the script is fully auditable.
jjgreen 2 hours ago
rvz an hour ago
If I were an attacker, this is the easiest way to gain root access, leak env variables and install ransomware on the machine.
Accepting this as the standard way to install software just for convenience over security is just pure ignorance until a massive breach happens.
This even before mentioning flawed standards such as INSTALL.md [0] for agents to curl | sudo bash unattended from a .md file.
[0] https://www.mintlify.com/blog/install-md-standard-for-llm-ex...
krapp 2 hours ago
aroido-bigcat 2 hours ago
Comment deleted