Remix.run Logo
akerl_ 19 hours ago

A huge part of GPG’s purported use case is getting a signed/encrypted/both blob from somebody and using GPG to confirm it’s authentic. This is true for packages you download and for commits with signatures.

Handling untrusted input is core to that.

xorcist 19 hours ago | parent [-]

It is, and other software handling untrusted data should also treat it as adversarial. For example, your package tool should probably not output raw package metadata to the terminal.

akerl_ 19 hours ago | parent [-]

I think you’re missing the forest for the trees.