I set up a quick demonstration to show risks of curl|bash and how a bad-actor could potentially hide a malicious script that appears safe.

It’s nothing new or groundbreaking, but I figure it never hurts to have another reminder.

  • wildbus8979@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    31
    arrow-down
    1
    ·
    7 days ago

    And you better inspect and execute a downloaded copy, because a malicious actor can serve a different file for curl/wget than to your browser

    • K3CAN@lemmy.radioOP
      link
      fedilink
      English
      arrow-up
      10
      ·
      edit-2
      7 days ago

      Yep! That’s what the post shows.

      I created a live demo file, too, so that you can actually see the difference based on how you request the file.