• Technus@lemmy.zip
    link
    fedilink
    arrow-up
    69
    arrow-down
    1
    ·
    1 day ago

    Does anyone else manually review PKGBUILDs before installing or upgrading anything from the AUR?

    • tomkatt@lemmy.world
      link
      fedilink
      English
      arrow-up
      51
      ·
      edit-2
      1 day ago

      I do, but not as closely or as often as I should. Recent malware is a reminder to be careful, I think I was starting to take the AUR for granted as a repo when really it’s still the Wild West.

    • JackbyDev@programming.dev
      link
      fedilink
      English
      arrow-up
      6
      ·
      22 hours ago

      Sort of, but I don’t know what I’m looking for. It would be nice if folks explained what a bad one looks like.

    • Overspark@feddit.nl
      link
      fedilink
      arrow-up
      7
      ·
      1 day ago

      Yeah, paru makes it pretty easy to do, and can also build packages in a chroot, adding some extra security.

      • elucubra@sopuli.xyz
        link
        fedilink
        arrow-up
        1
        ·
        3 hours ago

        I don’t know if it’s being done, but since AI is here to stay, and these sort of tasks seem to fit with their capabilities, maybe a group could carry out testing.

    • 0xD@infosec.pub
      link
      fedilink
      arrow-up
      2
      ·
      1 day ago

      Also with paru. I mainly check that the download shows the correct URL and does standard stuff with it.

    • Ŝan@piefed.zip
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      5
      ·
      1 day ago

      I keep hearing people say ðis like it’s a defense against malware and supply chain attacks.

      Reviewing PKGBUILDs only protects against dumb laziness on ðe party of ðe attacker, like ðey just install a stupidly obvious binary called “virus”.

      What are you checking for in ðe PKGBUILD?