274

curl https://some-url/ | sh

I see this all over the place nowadays, even in communities that, I would think, should be security conscious. How is that safe? What's stopping the downloaded script from wiping my home directory? If you use this, how can you feel comfortable?

I understand that we have the same problems with the installed application, even if it was downloaded and installed manually. But I feel the bar for making a mistake in a shell script is much lower than in whatever language the main application is written. Don't we have something better than "sh" for this? Something with less power to do harm?

top 50 comments
sorted by: hot top controversial new old
[-] Artyom@lemm.ee 39 points 5 days ago

What's stopping the downloaded script from wiping my home directory?

What's stopping any Makefile, build script, or executable from running rm -rf ~? The correct answer is "nothing". PPAs are similarly open, things are a little safer if you only use your distro's default package sources, but it's always possible that a program will want to be able to delete something in your home directory, so it always has permission.

Containerized apps are the only way around this, where they get their own home directory.

[-] easily3667@lemmus.org 6 points 4 days ago* (last edited 4 days ago)

Don't forget your package manager, running someone's installer as root

It's roughly the same state as when windows vista rolled out UAC in 2007 and everything still required admin rights because that's just how everything worked....but unlike Microsoft, Linux distros never did the thing of splitting off installs into admin vs unprivileged user installers.

[-] brian@programming.dev 5 points 4 days ago

plenty of package managers have.

flatpak doesn't require any admin to install a new app

nixos doesn't run any code at all on your machine for just adding a package assuming it's already been cached. if it hasn't been cached it's run in a sandbox. the cases other package managers use post install configuration scripts for are a different mechanism which possibly has root access depending on what it is.

load more comments (2 replies)
[-] Zron@lemmy.world 15 points 4 days ago

For security reasons, I review every line of code before it’s executed on my machine.

Before I die, I hope to take my ‘93 dell optiplex out of its box and finally see what this whole internet thing is about.

[-] moseschrute@lemmy.ml 6 points 4 days ago* (last edited 4 days ago)

Not good enough. You should really be inspecting your CPU with a microscope.

You have the option of piping it into a file instead, inspecting that file for yourself and then running it, or running it in some sandboxed environment. Ultimately though, if you are downloading software over the internet you have to place a certain amount of trust in the person your downloading the software from. Even if you're absolutely sure that the download script doesn't wipe your home directory, you're going to have to run the program at some point and it could just as easily wipe your home directory at that point instead.

[-] HelloRoot@lemy.lol 34 points 6 days ago

All the software I have is downloaded from the internet...

[-] WhatAmLemmy@lemmy.world 28 points 6 days ago* (last edited 6 days ago)

You should try downloading the software from your mind brain, like us elite hackers do it. Just dump the binary from memory into a txt file and exe that shit, playa!

You should start getting it from CD-roms, that shit you can trust

[-] veroxii@aussie.zone 22 points 6 days ago

I got my software from these free USB sticks I found in the parking lot.

load more comments (2 replies)
load more comments (2 replies)
[-] WolfLink@sh.itjust.works 14 points 4 days ago* (last edited 4 days ago)

It isn’t more dangerous than running a binary downloaded from them by any other means. It isn’t more dangerous than downloaded installer programs common with Windows.

TBH macOS has had the more secure idea of by default using sandboxes applications downloaded directly without any sort of installer. Linux is starting to head in that direction now with things like Flatpak.

[-] ExperimentalGuy@programming.dev 13 points 5 days ago

If you're worried, download it into a file first and read it.

What's stopping the downloaded script from wiping my home directory?

Lol. Lmao

[-] thomask@lemmy.sdf.org 17 points 5 days ago* (last edited 5 days ago)

The security concerns are often overblown. The bigger problem for me is I don't know what kind of mess it's going to make or whether I can undo it. If it's a .deb or even a tarball to extract in /usr/local then I know how to uninstall.

I will still use them sometimes but for things I know and understand - e.g. rustup will put things in ~/.rustup and update the PATH in my shell profile and because I know that's what it does I'm happy to use the automation on a new system.

[-] jagged_circle@feddit.nl 6 points 5 days ago

Damn that's bad misinformation. Its a security nightmare

[-] thomask@lemmy.sdf.org 11 points 5 days ago* (last edited 5 days ago)

So tell me: if I download and run a bash script over https, or a .deb file over https and then install it, why is the former a "security nightmare" and the latter not?

load more comments (7 replies)
load more comments (16 replies)
[-] emberpunk@lemmy.ml 6 points 4 days ago

You could just read the script file first.. Or YOLO trust it like you trust any file downloaded from a relatively safe source.. At least you can read a script.

[-] syklemil@discuss.tchncs.de 31 points 6 days ago

This is simpler than the download, ./configure, make, make install steps we had some decades ago, but not all that different in that you wind up with arbitrary, unmanaged stuff.

Preferably use the distro native packages, or else their build system if it's easily available (e.g. AUR in Arch)

[-] lemmeBe@sh.itjust.works 23 points 6 days ago

I think safer approach is to:

  1. Download the script first, review its contents, and then execute.
  2. Ensure the URL uses HTTPS to reduce the risk of man-in-the-middle attacks
[-] stevedice@sh.itjust.works 11 points 5 days ago

If you've downloaded and audited the script, there's no reason to pipe it from curl to sh, just run it. No https necessary.

load more comments (4 replies)
[-] possiblylinux127@lemmy.zip 6 points 5 days ago

Install scripts are bad in general. ideally use officially packaged software.

load more comments (10 replies)
load more comments (3 replies)
[-] easily3667@lemmus.org 10 points 5 days ago

This is just normal Linux poor security. Even giants like docker do this.

Docker doesn't do this anymore. Their install script got moved to "only do this for testing".

Use a convenience script. Only recommended for testing and development environments.

Now, their install page recommends packages/repos first, and then a manual install of the binaries second.

[-] Lemmchen@feddit.org 23 points 6 days ago
[-] Undaunted@feddit.org 20 points 6 days ago

You shouldn't install software from someone you don't trust anyway because even if the installation process is save, the software itself can do whatever it has permission to.

"So if you trust their software, why not their install script?" you might ask. Well, it is detectable on server side, if you download the script or pipe it into a shell. So even if the vendor it trustworthy, there could be a malicious middle man, that gives you the original and harmless script, when you download it, and serves you a malicious one when you pipe it into your shell.

And I think this is not obvious and very scary.

load more comments (6 replies)
[-] billwashere@lemmy.world 15 points 5 days ago
[-] possiblylinux127@lemmy.zip 6 points 5 days ago

Download it and then read it. Curl has a different user agent than web browsers.

load more comments (2 replies)
[-] serenissi@lemmy.world 18 points 6 days ago

Unpopular opinion, these are handy for quickly installing in a new vm or container (usually throwaway) where one don't have to think much unless the script breaks. People don't install thing on host or production multiple times, so anything installed there is usually vetted and most of the times from trusted sources like distro repos.

For normal threat model, it is not much different from downloading compiled binary from somewhere other than well trusted repos. Windows software ecosystem is famously infamous for exactly the same but it sticks around still.

load more comments (4 replies)
[-] tatterdemalion@programming.dev 9 points 5 days ago

Back up your data folks. You're probably more likely to accidentally rm -rf yourself than download a script that will do it.

load more comments (1 replies)
[-] Kissaki@programming.dev 3 points 4 days ago

| sh stands for shake head at bad practices

[-] MangoPenguin 16 points 6 days ago* (last edited 6 days ago)

It's not much different from downloading and compiling source code, in terms of risk. A typo in the code could easily wipe home or something like that.

Obviously the package manager repo for your distro is the best option because there's another layer of checking (in theory), but very often things aren't in the repos.

The solution really is just backups and snapshots, there are a million ways to lose files or corrupt them.

load more comments (4 replies)
[-] jagged_circle@feddit.nl 8 points 5 days ago* (last edited 5 days ago)

I dont just cringe, I open a bug report. You can be the change to fix this.

load more comments (3 replies)
[-] 30p87@feddit.org 14 points 6 days ago

Well yeah ... the native package manager. Has the bonus of the installed files being tracked.

load more comments (5 replies)
[-] Boomkop3@reddthat.com 4 points 5 days ago

And don't forget to sudo!

[-] ikidd@lemmy.world 6 points 5 days ago

When I modded some subreddits I had an automod rule that would target curl-bash pipes in comments and posts, and remove them. I took a fair bit of heat over that, but I wasn't backing down.

I had a lot of respect for Tteck and had a couple discussions with him about that and why I was doing that. I saw that eventually he put a notice up that pretty much said what I did about understanding what a script does, and how the URL you use can be pointed to something else entirely long after the commandline is posted.

[-] onlinepersona@programming.dev 10 points 6 days ago

Those just don't get installed. I refuse to install stuff that way. It's to reminiscent of installing stuff on windows. "Pssst, hey bud, want to run this totally safe executable on your PC? It won't do anything bad. Pinky promise". Ain't happening.

The only exception I make is for nix on non-nixos machines because thwt bootstraps everything and I've read that script a few times.

Anti Commercial-AI license

[-] swizzlestick@lemmy.zip 10 points 6 days ago

It's convenience over security, something that creeps in anywhere there is popularity. For those who just want x or y to work without needing to spend their day in the terminal - they're great.

You'd expect these kinds of script to be well tested against their targets and for the user to have/identify the correct target. Their sources should at least point out the security issue and advise to grab and inspect before straight up piping it though. Some I have seen do this.

Running them like this means you put 100% trust in the author, the source and your DNS. Not a big ask for some. Unthinkable for others.

load more comments
view more: next ›
this post was submitted on 13 Mar 2025
274 points (100.0% liked)

Linux

6540 readers
458 users here now

A community for everything relating to the GNU/Linux operating system

Also check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS