-
-
Notifications
You must be signed in to change notification settings - Fork 366
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add SudoBin and SudoFlags #1101
Conversation
I would have added a warning pre sudo call detailing the location of |
Why? We don't do it with any other commands. |
Because changing yay's sudo bin and flags can potentially allow the execution of other commands as root. |
I guess. But a malicious program could instead change pacmanbin to a script that prompts you for your password or makes a call to sudo. It could also place a sudo binary somewhere in home and add it to path. Hell it could probably redirect all your input to a file or log your keys. So I don't really think sudo specifically makes it any less secure. |
Kind of in a different issue., since the "solution" would be to print all commands executed or do the same for pacmanbin and print when it's altered from
Yes, then it would be different from The objective is not to impede user action, just inform |
Surely you would have to impede the user though by adding a prompt. Otherwise you're adding a warning but still calling the potentially malicious script right after. |
In case of sudo commands (without In this scenario you're assuming user level is already compromised so executing a malicious script just in the user directories would be out of scope already. |
Isn't the entire point of the warning for the case there's a malicious script? Anyway my point is the entire thing is out of scope. |
Same as #492 but with #942 (comment).
Fixes #1031