this post was submitted on 13 Mar 2025
276 points (96.6% liked)
Linux
6466 readers
701 users here now
A community for everything relating to the GNU/Linux operating system
Also check out:
Original icon base courtesy of lewing@isc.tamu.edu and The GIMP
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Irrelevant. This is just an excuse people use to try and win the argument after it is pointed out to them that there's actually no security issue with
curl | bash
.It's waaaay easier to hide malicious code in a binary than it is in a Bash script.
You can still see the "hidden" shell script that is served for Bash - just pipe it through
tee
and then into Bash.Can anyone even find one single instance of that trick ever actually being used in the wild (not as a demo)?
I never tried to win any argument. Hell I was not even aware that I'm participating in one. I just wanted to share the info, that even if the vendor is absolutely trustworthy and even if you validated the script by downloading and looking at it, there's still another hole that's not obvious to see.
Yes it's unlikely, but again, I never said it were. There are also arguments you can run curl with, to tell it to do the download first and then push it through the pipe afterwards, though I don't know them by heart now.
It won't cost you anything to set those parameters, when you insist to use curl | bash, just in the off chance that someone's trying to do what I mentioned.
But I'm also someone who usually validates their downloads with a checksum so maybe I'm just weird. Who knows.