this post was submitted on 13 Mar 2025
275 points (96.6% liked)

Linux

6450 readers
590 users here now

A community for everything relating to the GNU/Linux operating system

Also check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS
 

curl https://some-url/ | sh

I see this all over the place nowadays, even in communities that, I would think, should be security conscious. How is that safe? What's stopping the downloaded script from wiping my home directory? If you use this, how can you feel comfortable?

I understand that we have the same problems with the installed application, even if it was downloaded and installed manually. But I feel the bar for making a mistake in a shell script is much lower than in whatever language the main application is written. Don't we have something better than "sh" for this? Something with less power to do harm?

(page 2) 50 comments
sorted by: hot top controversial new old
[–] jagged_circle@feddit.nl 6 points 1 day ago* (last edited 1 day ago) (3 children)

I dont just cringe, I open a bug report. You can be the change to fix this.

load more comments (3 replies)
[–] billwashere@lemmy.world 19 points 1 day ago (1 children)
[–] possiblylinux127@lemmy.zip 8 points 1 day ago (1 children)

Download it and then read it. Curl has a different user agent than web browsers.

[–] billwashere@lemmy.world 5 points 1 day ago (1 children)

Yeah I guess if they were being especially nefarious they could supply two different scripts based on user-agent. But I meant what you said anyways… :) I download and then read through the script. I know this is a common thing and people are wary of doing it, but has anyone ever heard of there being something disreputable in one of this scripts? I personally haven’t yet.

[–] possiblylinux127@lemmy.zip 2 points 1 day ago

I've seen it many times. It usually takes the form of fake websites that are impersonating the real thing. It is easy to manipulate Google results. Also, there have been a few cases where a bad design and a typo result in data loss.

[–] zygo_histo_morpheus@programming.dev 87 points 2 days ago (12 children)

You have the option of piping it into a file instead, inspecting that file for yourself and then running it, or running it in some sandboxed environment. Ultimately though, if you are downloading software over the internet you have to place a certain amount of trust in the person your downloading the software from. Even if you're absolutely sure that the download script doesn't wipe your home directory, you're going to have to run the program at some point and it could just as easily wipe your home directory at that point instead.

[–] HelloRoot@lemy.lol 31 points 2 days ago (4 children)

All the software I have is downloaded from the internet...

[–] WhatAmLemmy@lemmy.world 26 points 2 days ago* (last edited 2 days ago)

You should try downloading the software from your mind brain, like us elite hackers do it. Just dump the binary from memory into a txt file and exe that shit, playa!

[–] zygo_histo_morpheus@programming.dev 16 points 1 day ago (1 children)

You should start getting it from CD-roms, that shit you can trust

[–] veroxii@aussie.zone 25 points 1 day ago (1 children)

I got my software from these free USB sticks I found in the parking lot.

[–] FauxLiving@lemmy.world 7 points 1 day ago

Ah, you're one of my users

[–] strongarm@lemmy.dbzer0.com 1 points 1 day ago

Steady on Buck Rogers, what is this, 2025!?

load more comments (1 replies)
[–] cschreib@programming.dev 7 points 1 day ago

Indeed, looking at the content of the script before running it is what I do if there is no alternative. But some of these scripts are awfully complex, and manually parsing the odd bash stuff is a pain, when all I want to know is : 1) what URL are you downloading stuff from? 2) where are you going to install the stuff?

As for running the program, I would trust it more than a random deployment script. People usually place more emphasis on testing the former, not so much the latter.

load more comments (10 replies)
[–] ikidd@lemmy.world 6 points 1 day ago

When I modded some subreddits I had an automod rule that would target curl-bash pipes in comments and posts, and remove them. I took a fair bit of heat over that, but I wasn't backing down.

I had a lot of respect for Tteck and had a couple discussions with him about that and why I was doing that. I saw that eventually he put a notice up that pretty much said what I did about understanding what a script does, and how the URL you use can be pointed to something else entirely long after the commandline is posted.

[–] lemmeBe@sh.itjust.works 24 points 1 day ago (5 children)

I think safer approach is to:

  1. Download the script first, review its contents, and then execute.
  2. Ensure the URL uses HTTPS to reduce the risk of man-in-the-middle attacks
[–] jagged_circle@feddit.nl 3 points 1 day ago

Key being reduce. Https doesn't protect from loads of attacks. Best to verify the sig.

If its not signed, open a bug report

[–] possiblylinux127@lemmy.zip 6 points 1 day ago (10 children)

Install scripts are bad in general. ideally use officially packaged software.

load more comments (10 replies)
[–] stevedice@sh.itjust.works 14 points 1 day ago (4 children)

If you've downloaded and audited the script, there's no reason to pipe it from curl to sh, just run it. No https necessary.

load more comments (4 replies)
load more comments (2 replies)
[–] Undaunted@feddit.org 21 points 1 day ago (6 children)

You shouldn't install software from someone you don't trust anyway because even if the installation process is save, the software itself can do whatever it has permission to.

"So if you trust their software, why not their install script?" you might ask. Well, it is detectable on server side, if you download the script or pipe it into a shell. So even if the vendor it trustworthy, there could be a malicious middle man, that gives you the original and harmless script, when you download it, and serves you a malicious one when you pipe it into your shell.

And I think this is not obvious and very scary.

load more comments (6 replies)
[–] ulterno@programming.dev -1 points 19 hours ago

I don't cringe. Just instinctively Ctrl+W

[–] serenissi@lemmy.world 15 points 1 day ago (1 children)

Unpopular opinion, these are handy for quickly installing in a new vm or container (usually throwaway) where one don't have to think much unless the script breaks. People don't install thing on host or production multiple times, so anything installed there is usually vetted and most of the times from trusted sources like distro repos.

For normal threat model, it is not much different from downloading compiled binary from somewhere other than well trusted repos. Windows software ecosystem is famously infamous for exactly the same but it sticks around still.

[–] jagged_circle@feddit.nl 1 points 1 day ago (1 children)

Yeah and windows is famous for botnets lol.

[–] Aux@feddit.uk 3 points 1 day ago (2 children)

Yet most botnets are Linux based.

load more comments (2 replies)
[–] knexcar@lemmy.world 3 points 1 day ago (2 children)

What does curl even do? Unstraighten? Seems like any other command I’d blindly paste from an internet thread into a terminal window to try to get something on Linux to work.

[–] ArsonButCute@lemmy.dbzer0.com 7 points 1 day ago (2 children)

cURL (pronounced curl) stands for client for URL. It transfers data from a url, which you can then do things with.

load more comments (2 replies)
[–] Irelephant@lemm.ee 2 points 1 day ago (2 children)

curl sends requests, curl lemmy.world would return the html of lemmy.worlds homepage. piping it into bash means that you are fetching a shell script, and running it.

load more comments (2 replies)
[–] syklemil@discuss.tchncs.de 28 points 2 days ago

This is simpler than the download, ./configure, make, make install steps we had some decades ago, but not all that different in that you wind up with arbitrary, unmanaged stuff.

Preferably use the distro native packages, or else their build system if it's easily available (e.g. AUR in Arch)

[–] MangoPenguin@lemmy.blahaj.zone 17 points 1 day ago* (last edited 1 day ago) (4 children)

It's not much different from downloading and compiling source code, in terms of risk. A typo in the code could easily wipe home or something like that.

Obviously the package manager repo for your distro is the best option because there's another layer of checking (in theory), but very often things aren't in the repos.

The solution really is just backups and snapshots, there are a million ways to lose files or corrupt them.

load more comments (4 replies)
[–] Lemmchen@feddit.org 21 points 2 days ago (1 children)
load more comments (1 replies)
[–] onlinepersona@programming.dev 11 points 1 day ago

Those just don't get installed. I refuse to install stuff that way. It's to reminiscent of installing stuff on windows. "Pssst, hey bud, want to run this totally safe executable on your PC? It won't do anything bad. Pinky promise". Ain't happening.

The only exception I make is for nix on non-nixos machines because thwt bootstraps everything and I've read that script a few times.

Anti Commercial-AI license

[–] 30p87@feddit.org 15 points 2 days ago (5 children)

Well yeah ... the native package manager. Has the bonus of the installed files being tracked.

load more comments (5 replies)
load more comments
view more: ‹ prev next ›