- cross-posted to:
- linux@programming.dev
- cross-posted to:
- linux@programming.dev
Is AUR more risky than before? Nope. But this targets more people than ever. StreamOS and CachyOS are pretty popular these days.
SteamOS users dont use the AUR.
This is the most likely reason why all of sudden there is an uptick in attempt to embed malware in AUR build scripts.
Man, we’re gonna have to change the name of the AUR because bad journalists keep thinking this has something to do with the distro.
“Arch Linux Users who go out of their way to install RAT at risk of installing RAT”
I saw two pkgbuild from the user, I don’t really know what I’m looking at in pkgbuilds generally but these were dead obvious something was bogus . downloading arbitrary files from some url like (segs)(dot)(lol) hopefully sufficiently defanged
I feel like these headlines are designed to be way scarier than the scenarios actually are to people that don’t know much about Arch Linux.
I think it’s a good thing to frighten users just a little bit. Arch is no longer a niche distro and it was only a matter of time before someone took advantage of the generally unvetted AUR. It’s a wake-up call that the times of good faith are gone and you need to pay attention.
Instead of someone accidentally ruining your pc, they intentionally ruin your pc!
Just tell them to read the arch wiki page on AUR and take it seriously, IMO
Just standard clickbait, but sounds more serious because we understand the extent to which they’re going out of their way to bend and withhold the facts.
Seriously. It’s technically true that there was a RAT on the AUR but the way it’s titled is written to intentionally invoke times where it was more than one thing.
true and part of me suspects that it’s intentional on the part of arch users so that they can continue to tell the world that they “use arch btw” lol
The malicious packages were found and removed quite quickly. Also anyone who doesn’t blindly install from the AUR would have seen a suspicious .lol url. I suppose that a genuine package using a .lol url isn’t impossible, it’s just very unlikely,
These attacks do demonstrate the strength and weakness of the AUR, that anyone can upload anything at any time. The same as flathub and the snap store. Treat all of them with appropriate caution.
Flatpak does have a concept of Verified Publisher. Many distros ship flatpak app store with default filter set to Verified Publisher only.
That sounds like a nice feature we could use for the Aur actually. We already have the
votes
value, but some sort of verification body could help rescue the Aur’s reputation.Many distros ship flatpak app store with default filter set to Verified Publisher only.
Also, if your distro doesn’t do this, you can do it yourself. You can modify, for instance, KDE Discover’s flathub repo to use the verified subset.
Me, a hacker, targeting anyone who says they use Arch btw.
Installing from AUR without reviewing the
PKGBUILD
is a self pwn.isnt that well known though? AUR packages are built by third parties (eg users) and there were always warnings against just this, no?
It is a well known risk but not something that was a real risk numerically. I mean, it still isn’t given the number of packages in the AUR.
This is a couple of malicious packages discovered in a short period though. Not a good sign. It was really impact the AUR if polluting it with malware became common.
You should always inspect AUR packages before installing them but few people do. Many would not even know what they were looking at.
yeah, that’s almost as bad as those apps requiring you to pipe a remote script through sudo shell
God I hate those. The worst way to distribute apps.
especially when flatpaks exist now!
This is why I just use the Chaotic AUR, knowing that something like this was being posted everywhere. My producer, Neigsendoig, does the exact same with his machine.
We both use CachyOS anyway.