| ▲ | embedding-shape 15 hours ago | |||||||||||||||||||||||||||||||
> What environment are you using that: - Has access to Youtube - Can run Python code - Can’t run JS code Nothing specific, just tend to run tools in restricted VMs where things are whitelisted and it's pretty much as locked down as it can be. It can run whatever I want it to run, including JS, and as the logs in my previous comment shows, it is in fact running both Python and JS, and has access to YouTube, otherwise it wouldn't have worked :) I tend to have the rule of "least possible privileges" so most stuff I run like that has to be "prepped" basically, especially things that does network requests sometimes (updating the solver in this case), just a matter of packaging it before I run it, so it's not the end of the world. No weird OS or architecture here, just good ol' Linux. > IMO it seems like it should safe to trust code being served by Google on the official Youtube domain The JS script being downloaded is from the yt-dlp GitHub organization (https://github.com/yt-dlp/ejs/releases/download/0.3.1/yt.sol...), not from Google or any websites, FWIW. | ||||||||||||||||||||||||||||||||
| ▲ | Wowfunhappy 13 hours ago | parent | next [-] | |||||||||||||||||||||||||||||||
> The JS script being downloaded is from the yt-dlp GitHub organization I meant the challenge that is the reason they need the Javascript in the first place. You can’t very well run yt-dlp without trusting yt-dlp code. | ||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||
| ▲ | j45 15 hours ago | parent | prev [-] | |||||||||||||||||||||||||||||||
This is the way. Leaving so many packages with unfettered access to your system is only so secure. | ||||||||||||||||||||||||||||||||