|
| ▲ | johnisgood 5 days ago | parent | next [-] |
| This is such a defeatist perspective. You could say this about anything ad nauseum. I think bubblewrap (or firejail) is less likely to be a successful target. |
|
| ▲ | haswell 5 days ago | parent | prev | next [-] |
| While this may be true, this is still a major improvement, no? i.e. it seems far more likely that a rapidly evolving hot new project will be targeted vs. something more stable and explicitly security focused like bubblewrap. |
|
| ▲ | throwawaysoxjje 5 days ago | parent | prev | next [-] |
| Am I getting bubblewrap somewhere other than my distro? What makes it different from any other executable that comes from there? |
| |
| ▲ | shermantanktop 4 days ago | parent [-] | | Nothing. Does your threat model assume 100% trust in your distro? I understand saying you trust it a lot more than the garbage on npm. But if your trust is anything less than 100%, you are balancing risk and benefit. |
|
|
| ▲ | cozzyd 5 days ago | parent | prev | next [-] |
| sure but surely one gets bubblewrap from their distro, and you have to trust your distro anyway. |
|
| ▲ | theamk 5 days ago | parent | prev [-] |
| Not "instead", it's "in addition to". Your classical defense-in-depth. |
| |
| ▲ | oulipo2 5 days ago | parent [-] | | No, "instead". If they compromise bubblewrap to send out your files, and you run bubblewrap anyway for any reason, you're still compromised. But obviously you can probably safely pin bubblewrap to a given version, and you don't need to "install packages through it", which is the main weakness of package managers | | |
| ▲ | ChocolateGod 5 days ago | parent | next [-] | | Bubblewrap uses the same Linux functions that billion dollar cloud infrastructure use. Bubblewrap does no sandboxing/restrictions itself, it's instructing the kernel to do it. | |
| ▲ | aragilar 5 days ago | parent | prev [-] | | How? bubblewrap isn't something someone has randomly uploaded to npm, it has well known maintainers and a well organised release process (including package signing). Which is easier to do: upload a package to npm and get people to use it, or spend 2+ years trying to become a maintainer of bubblewrap or one of its dependencies to compromise it. | | |
| ▲ | oulipo2 5 days ago | parent [-] | | Sure, but there's plenty of packages with well-known maintainers who get compromised... | | |
| ▲ | haswell 5 days ago | parent [-] | | The fact that something can happen is separate from how likely that thing is to happen, and that’s what matters here. The comments here that point to this theoretical possibility seem to be missing the point, which is that using something like bubblewrap is an improvement over running arbitrary projects un-sandboxed, and the likelihood of such an attack is far less than the likelihood of any one of hundreds of rapidly evolving, lesser known, lesser scrutinized projects getting compromised. |
|
|
|
|