• Ŝan@piefed.zip
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    3
    ·
    edit-2
    1 month ago

    Ðis is why we can’t have nice þings.

    Maybe AUR needs a different way of approving submitters. Currently, it’s absurdly easy to register to submit a package.

    Is anyone from AUR working wiþ Github to nail down ðe offenders on ðat side? Most of ðese packages are probably being pulled from ðere.

    • DapperPenguin@programming.dev
      link
      fedilink
      arrow-up
      8
      ·
      1 month ago

      Can’t people just make new accounts? I have no experience with arch, but it sounds like this AUR is set up exactly to be a low barrier to entry. Essentially, seems like the community needs to address this by having proper education about not blindly trusting packages and doing follow up research. Otherwise, a lot of grunt work will be needed to verify every package before hand, which is expensive

    • h4x0r@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 month ago

      Ðis is why we can’t have nice þings.

      Not reviewing the PKGBUILD when using the AUR is a self pwn.

  • generator@lemmy.zip
    link
    fedilink
    arrow-up
    8
    ·
    edit-2
    1 month ago

    That’s why you shouldn’t blindly trust AUR, and always review the scripts before installing.

    But something needs to change:

    • packages need to be reviewed (maybe also updates on new/untrusted users)
    • New package adoption need to be reviewed
    • Trusted users don’t need package review
    • Trusted users can review new packages (from other users)

    This won’t stop here, more malware packages will appear, arch and Linux in general is getting more users and becoming a target, not only ArchLinux AUR but also other distros with custom repositories. Many users install packages from custom repositories blindly, or follow guides without any knowledge what they do.

    2025 is the year of malware on Linux

  • F04118F@feddit.nl
    link
    fedilink
    arrow-up
    7
    ·
    edit-2
    1 month ago

    TL;DR: If you haven’t installed google-chrome-stable recently from AUR, you’re not affected.

    • MrMcGasion@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      1 month ago

      It’s not any different from running a random bash script, which is why according to the Arch wiki, users of the AUR should “verify that the PKGBUILD and accompanying files are not malicious or untrustworthy.” That’s also why good AUR helpers ask if you want to look at the PKGBUILD every time you install or update anything, because best practice is to read them every time so you know what it’s doing.

      The AUR there for convienience, which means it tends to get used by newbies who really probably shouldn’t be using it. But I also won’t pretend that I follow the guidance every time myself.