• Technus@lemmy.zip
    link
    fedilink
    arrow-up
    63
    arrow-down
    2
    ·
    20 hours ago

    Does anyone else manually review PKGBUILDs before installing or upgrading anything from the AUR?

    • JackbyDev@programming.dev
      link
      fedilink
      English
      arrow-up
      4
      ·
      8 hours ago

      Sort of, but I don’t know what I’m looking for. It would be nice if folks explained what a bad one looks like.

    • tomkatt@lemmy.world
      link
      fedilink
      English
      arrow-up
      45
      ·
      edit-2
      18 hours ago

      I do, but not as closely or as often as I should. Recent malware is a reminder to be careful, I think I was starting to take the AUR for granted as a repo when really it’s still the Wild West.

    • Overspark@feddit.nl
      link
      fedilink
      arrow-up
      7
      ·
      14 hours ago

      Yeah, paru makes it pretty easy to do, and can also build packages in a chroot, adding some extra security.

    • Ŝan@piefed.zip
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      3
      ·
      11 hours ago

      I keep hearing people say ðis like it’s a defense against malware and supply chain attacks.

      Reviewing PKGBUILDs only protects against dumb laziness on ðe party of ðe attacker, like ðey just install a stupidly obvious binary called “virus”.

      What are you checking for in ðe PKGBUILD?

    • 0xD@infosec.pub
      link
      fedilink
      arrow-up
      2
      ·
      11 hours ago

      Also with paru. I mainly check that the download shows the correct URL and does standard stuff with it.