I set up a quick demonstration to show risks of curl|bash and how a bad-actor could potentially hide a malicious script that appears safe.
It’s nothing new or groundbreaking, but I figure it never hurts to have another reminder.
I set up a quick demonstration to show risks of curl|bash and how a bad-actor could potentially hide a malicious script that appears safe.
It’s nothing new or groundbreaking, but I figure it never hurts to have another reminder.
And you better inspect and execute a downloaded copy, because a malicious actor can serve a different file for curl/wget than to your browser
Yep! That’s what the post shows.
I created a live demo file, too, so that you can actually see the difference based on how you request the file.
Hit the nail on the head. Download the file, inspect, then run that local copy.