I set up a quick demonstration to show risks of curl|bash and how a bad-actor could potentially hide a malicious script that appears safe.

It’s nothing new or groundbreaking, but I figure it never hurts to have another reminder.

  • quick_snail@feddit.nl
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 hours ago

    a more cautious user might first paste the url into the address bar of their web browser to see what the script looks like before running it.

    Wow, I never thought anyone would be that dumb.

    Why wouldn’t they just wget it, read it, and then execute it?