Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. Just absolutely no regard for security at all.

Just absolutely no regard for security at all.

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
41 Indlæg 25 Posters 20 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • mhoye@cosocial.caM mhoye@cosocial.ca

    Just absolutely no regard for security at all. None. The entire burden of self-protection shifted to humans alone at their endpoints in systems and communities entirely, foundationally built on mutual trust and trustworthiness.

    feld@friedcheese.usF This user is from outside of this forum
    feld@friedcheese.usF This user is from outside of this forum
    feld@friedcheese.us
    wrote sidst redigeret af
    #18
    @mhoye

    > developers not working in an isolated environment (zone, vm, jail, etc) and letting their devtools access their whole laptop

    they deserve it
    mhoye@cosocial.caM mischievoustomato@tsundere.loveM khleedril@cyberplace.socialK 3 Replies Last reply
    0
    • mhoye@cosocial.caM mhoye@cosocial.ca

      Just absolutely no regard for security at all. None. The entire burden of self-protection shifted to humans alone at their endpoints in systems and communities entirely, foundationally built on mutual trust and trustworthiness.

      tanepiper@tane.codesT This user is from outside of this forum
      tanepiper@tane.codesT This user is from outside of this forum
      tanepiper@tane.codes
      wrote sidst redigeret af
      #19

      @mhoye postinstall was probably the worst thing added to npm - it's been there since the start with absolutely no effort to secure it or remove it

      mhoye@cosocial.caM 1 Reply Last reply
      0
      • feld@friedcheese.usF feld@friedcheese.us
        @mhoye

        > developers not working in an isolated environment (zone, vm, jail, etc) and letting their devtools access their whole laptop

        they deserve it
        mhoye@cosocial.caM This user is from outside of this forum
        mhoye@cosocial.caM This user is from outside of this forum
        mhoye@cosocial.ca
        wrote sidst redigeret af
        #20

        @feld "they deserved it" is a childish, bullshit response to systemic problems.

        1 Reply Last reply
        0
        • feld@friedcheese.usF This user is from outside of this forum
          feld@friedcheese.usF This user is from outside of this forum
          feld@friedcheese.us
          wrote sidst redigeret af
          #21
          @joe @mhoye well we used to tell people not to run .exe and .scr etc files on Windows or they'd get a trojan/virus.

          A lot of what people do these days on MacOS/Linux is pretty damn close to running untrusted code/binaries
          sun@shitposter.worldS 1 Reply Last reply
          0
          • feld@friedcheese.usF feld@friedcheese.us
            @joe @mhoye well we used to tell people not to run .exe and .scr etc files on Windows or they'd get a trojan/virus.

            A lot of what people do these days on MacOS/Linux is pretty damn close to running untrusted code/binaries
            sun@shitposter.worldS This user is from outside of this forum
            sun@shitposter.worldS This user is from outside of this forum
            sun@shitposter.world
            wrote sidst redigeret af
            #22
            @feld @joe @mhoye have you actually set it up, it's not easy to get a working but reasonably convenient dev system. I've been trying for a while now
            1 Reply Last reply
            0
            • tanepiper@tane.codesT tanepiper@tane.codes

              @mhoye postinstall was probably the worst thing added to npm - it's been there since the start with absolutely no effort to secure it or remove it

              mhoye@cosocial.caM This user is from outside of this forum
              mhoye@cosocial.caM This user is from outside of this forum
              mhoye@cosocial.ca
              wrote sidst redigeret af
              #23

              @tanepiper It's been around in the Debian dpkg system for ages, and it's got a lot of utility in that context and definitely works system-wide. But the Debian community doesn't have the NPM "let anyone do anything whatever" ethos, and the versioning systems in that part of the world are much slower and more methodical. You pretty much need to be on Sid and updating every day to get bitten by this in that part of the ecosystem.

              tanepiper@tane.codesT 1 Reply Last reply
              0
              • feld@friedcheese.usF This user is from outside of this forum
                feld@friedcheese.usF This user is from outside of this forum
                feld@friedcheese.us
                wrote sidst redigeret af
                #24
                @joe @mhoye you can trust what you get from your OS package manager and not much more.

                npm, pip, cargo, hex, gem, etc are the wild west
                1 Reply Last reply
                0
                • mhoye@cosocial.caM mhoye@cosocial.ca

                  @tanepiper It's been around in the Debian dpkg system for ages, and it's got a lot of utility in that context and definitely works system-wide. But the Debian community doesn't have the NPM "let anyone do anything whatever" ethos, and the versioning systems in that part of the world are much slower and more methodical. You pretty much need to be on Sid and updating every day to get bitten by this in that part of the ecosystem.

                  tanepiper@tane.codesT This user is from outside of this forum
                  tanepiper@tane.codesT This user is from outside of this forum
                  tanepiper@tane.codes
                  wrote sidst redigeret af
                  #25

                  @mhoye yes, that's the parallel part to it - being responsibility enough to have that level of utility - sadly npm is a wildwest of some of the poorest software development practices out there.

                  1 Reply Last reply
                  0
                  • tiotasram@kolektiva.socialT tiotasram@kolektiva.social

                    @hennell @mhoye openclaw is effectively a vulnerability/exploit payload itself, which to AI boosters doesn't seem like one.

                    hennell@phpc.socialH This user is from outside of this forum
                    hennell@phpc.socialH This user is from outside of this forum
                    hennell@phpc.social
                    wrote sidst redigeret af
                    #26

                    @tiotasram @mhoye yeah not sure I'd want it installed, but I assume it doesn't do anything just on install, like you'd need to set-up keys or features or something? But then I wouldn't assume packages could global install so who knows anymore.

                    1 Reply Last reply
                    0
                    • mhoye@cosocial.caM mhoye@cosocial.ca

                      Just absolutely no regard for security at all. None. The entire burden of self-protection shifted to humans alone at their endpoints in systems and communities entirely, foundationally built on mutual trust and trustworthiness.

                      vfig@mastodon.gamedev.placeV This user is from outside of this forum
                      vfig@mastodon.gamedev.placeV This user is from outside of this forum
                      vfig@mastodon.gamedev.place
                      wrote sidst redigeret af
                      #27

                      @mhoye the "S" in "AI" stands for "Security"

                      1 Reply Last reply
                      0
                      • mhoye@cosocial.caM mhoye@cosocial.ca

                        Just absolutely no regard for security at all. None. The entire burden of self-protection shifted to humans alone at their endpoints in systems and communities entirely, foundationally built on mutual trust and trustworthiness.

                        rick_d_card@mastodon.socialR This user is from outside of this forum
                        rick_d_card@mastodon.socialR This user is from outside of this forum
                        rick_d_card@mastodon.social
                        wrote sidst redigeret af
                        #28

                        @mhoye Yikes!

                        1 Reply Last reply
                        0
                        • mhoye@cosocial.caM mhoye@cosocial.ca

                          Just absolutely no regard for security at all. None. The entire burden of self-protection shifted to humans alone at their endpoints in systems and communities entirely, foundationally built on mutual trust and trustworthiness.

                          nobody@mastodon.acm.orgN This user is from outside of this forum
                          nobody@mastodon.acm.orgN This user is from outside of this forum
                          nobody@mastodon.acm.org
                          wrote sidst redigeret af
                          #29

                          @mhoye
                          Gotta love ai

                          1 Reply Last reply
                          0
                          • mhoye@cosocial.caM mhoye@cosocial.ca

                            Just absolutely no regard for security at all. None. The entire burden of self-protection shifted to humans alone at their endpoints in systems and communities entirely, foundationally built on mutual trust and trustworthiness.

                            dalias@hachyderm.ioD This user is from outside of this forum
                            dalias@hachyderm.ioD This user is from outside of this forum
                            dalias@hachyderm.io
                            wrote sidst redigeret af
                            #30

                            @mhoye How tf does "npm install openclaw" result in openclaw being given backdoor privileges? As opposed to just some files appearing that only do anything if you execute them.

                            1 Reply Last reply
                            0
                            • feld@friedcheese.usF feld@friedcheese.us
                              @mhoye

                              > developers not working in an isolated environment (zone, vm, jail, etc) and letting their devtools access their whole laptop

                              they deserve it
                              mischievoustomato@tsundere.loveM This user is from outside of this forum
                              mischievoustomato@tsundere.loveM This user is from outside of this forum
                              mischievoustomato@tsundere.love
                              wrote sidst redigeret af
                              #31
                              @feld @mhoye i wonder what this applies to, I've done baremetal rust dev (personal project) with cargo, but it was a thing I made from scratch.
                              1 Reply Last reply
                              0
                              • mischievoustomato@tsundere.loveM This user is from outside of this forum
                                mischievoustomato@tsundere.loveM This user is from outside of this forum
                                mischievoustomato@tsundere.love
                                wrote sidst redigeret af
                                #32
                                @feld @joe @mhoye @sun explain the process
                                feld@friedcheese.usF 1 Reply Last reply
                                0
                                • mhoye@cosocial.caM mhoye@cosocial.ca

                                  Just absolutely no regard for security at all. None. The entire burden of self-protection shifted to humans alone at their endpoints in systems and communities entirely, foundationally built on mutual trust and trustworthiness.

                                  lispi314@udongein.xyzL This user is from outside of this forum
                                  lispi314@udongein.xyzL This user is from outside of this forum
                                  lispi314@udongein.xyz
                                  wrote sidst redigeret af
                                  #33

                                  @mhoye@cosocial.ca That’s an impressive malware distribution hack.

                                  I would ask if cline was compromised but looking up what it is, it was malware from the very start.

                                  1 Reply Last reply
                                  0
                                  • mischievoustomato@tsundere.loveM mischievoustomato@tsundere.love
                                    @feld @joe @mhoye @sun explain the process
                                    feld@friedcheese.usF This user is from outside of this forum
                                    feld@friedcheese.usF This user is from outside of this forum
                                    feld@friedcheese.us
                                    wrote sidst redigeret af
                                    #34
                                    @mischievoustomato @joe @mhoye @sun make a freebsd jail (like a mini copy of the whole OS). put all your dev tools in there. run them from within the jail. if it gets popped, they can't get out to the juicier bits on your real OS
                                    ? 1 Reply Last reply
                                    0
                                    • mhoye@cosocial.caM mhoye@cosocial.ca

                                      Links:

                                      https://grith.ai/blog/clinejection-when-your-ai-tool-installs-another

                                      https://github.com/cline/cline/security/advisories/GHSA-9ppg-jx86-fqw7

                                      dancast@wandering.shopD This user is from outside of this forum
                                      dancast@wandering.shopD This user is from outside of this forum
                                      dancast@wandering.shop
                                      wrote sidst redigeret af
                                      #35

                                      @mhoye One more reason to be terrified of the next decade.

                                      1 Reply Last reply
                                      0
                                      • feld@friedcheese.usF feld@friedcheese.us
                                        @mischievoustomato @joe @mhoye @sun make a freebsd jail (like a mini copy of the whole OS). put all your dev tools in there. run them from within the jail. if it gets popped, they can't get out to the juicier bits on your real OS
                                        ? Offline
                                        ? Offline
                                        Gæst
                                        wrote sidst redigeret af
                                        #36

                                        @feld @joe @mhoye @sun @mischievoustomato would you recommend Linux jails in general for software that are not well supported for FreeBSD? Instead of just running say Alpine VMs on Bhyve. (currently two cases in mind: OpenwebUI and Invidious)

                                        1 Reply Last reply
                                        0
                                        • tanepiper@tane.codesT This user is from outside of this forum
                                          tanepiper@tane.codesT This user is from outside of this forum
                                          tanepiper@tane.codes
                                          wrote sidst redigeret af
                                          #37

                                          @Gaelan @mhoye I'd disagree it's overestimated - it's been 9 years since my first poc of a supply chain attack with npm and the problem is that is allows all sorts of remote code execution - it's not unique problem to npm, but instead it's the easiest way to ship malware at scale - simply the number of incidents per year with always the same root cause shows this.

                                          https://github.com/tanepiper/steal-ur-stuff

                                          1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper