| ▲ | akerl_ 19 hours ago | |||||||
A huge part of GPG’s purported use case is getting a signed/encrypted/both blob from somebody and using GPG to confirm it’s authentic. This is true for packages you download and for commits with signatures. Handling untrusted input is core to that. | ||||||||
| ▲ | xorcist 19 hours ago | parent [-] | |||||||
It is, and other software handling untrusted data should also treat it as adversarial. For example, your package tool should probably not output raw package metadata to the terminal. | ||||||||
| ||||||||