this post was submitted on 05 Mar 2024
133 points (87.2% liked)

Open Source

31236 readers
253 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 5 years ago
MODERATORS
 

Radicle: Open-Source, Peer-to-Peer, GitHub Alternative
https://radicle.xyz/
@opensource

you are viewing a single comment's thread
view the rest of the comments
[–] Asudox@lemmy.world 4 points 8 months ago (1 children)
[–] delirious_owl@discuss.online -2 points 8 months ago* (last edited 8 months ago) (1 children)

Crates is insecure and, as pointed out above, so is piping curl to bash for installing rust Dev tools

[–] Asudox@lemmy.world 3 points 8 months ago (2 children)

Crates is insecure

And? You are literally installing someone else's code. The compiler isn't an AV. This is true for all langs.

piping curl to bash for installing rust Dev tools

How is it any different than installing binaries from the site and just pulling the binary via curl? The bash script is also visible to anyone, feel free to check it for anything that might be malicious.

[–] chebra@mstdn.io 2 points 8 months ago

@Asudox @delirious_owl

There are many much safer ways of installing someone else's code than curl|bash. It doesn't even verify any signatures...

[–] delirious_owl@discuss.online 1 points 8 months ago

Trust is a thing. We should trust the person writing our dependencies and be able to verify that it was published by them, and not somebody in the middle maliciously altering the code.

You should not be installing unsigned binaries from a website. Either use a package manager that checks for signatures or manually check the signatures yourself. If the project doesn't sign their releases, open a bug report.