Security implications of source/executing abra.sh from abra #199

Open
opened 2021-07-06 08:46:26 +00:00 by decentral1se · 0 comments
Owner

Is there something we should be considering here?

Packagers could indeed rm -rf / in the abra.sh but then we probably wouldn't be giving that person commit access to the repository. Someone could spoof the repositories? That sounds pretty far fetched.

I know Yunohost have a setup where they make packagers generate checksums of their scripts on the package side and then installer script validates those checksums. Do we also need to consider something like that?

Is there something we should be considering here? Packagers could indeed `rm -rf /` in the `abra.sh` but then we probably wouldn't be giving that person commit access to the repository. Someone could spoof the repositories? That sounds pretty far fetched. I know Yunohost have a setup where they make packagers generate checksums of their scripts on the package side and then installer script validates those checksums. Do we also need to consider something like that?
decentral1se added the
question
label 2021-07-06 08:46:26 +00:00
This repo is archived. You cannot comment on issues.
No Milestone
No Assignees
1 Participants
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: coop-cloud/abra#199
No description provided.