| ▲ | trimethylpurine 5 hours ago | ||||||||||||||||
I don't see what the fuss is about. This all looks pretty standard. I use random people's stuff all the time. Isn't that the point of open source? Did you find something malicious in the random GitHub repo? If so, you should write an article about that instead. | |||||||||||||||||
| ▲ | kevinsync 4 hours ago | parent | next [-] | ||||||||||||||||
Using somebody's stuff is different than hot-linking directly to a hosted version of it, even just from the perspective that dude could delete it at any time and break the whole app. | |||||||||||||||||
| |||||||||||||||||
| ▲ | rendx 4 hours ago | parent | prev | next [-] | ||||||||||||||||
I don't know if you're being serious or not, but in case you are: There is a difference between (re)using other people's open sourced code, hopefully reviewed, and giving anyone in control of the third party repository the ability to run arbitrary code on your user's devices. Even if the "random GitHub repo" doesn't contain any malicious code right now, it may well contain some tomorrow. | |||||||||||||||||
| |||||||||||||||||
| ▲ | input_sh 4 hours ago | parent | prev | next [-] | ||||||||||||||||
It's always a better idea to make a local copy of it. Imagine they're downloading a project directly from your GitHub account. Even if you're not doing anything malicious and have no intention of doing anything malicious even after you've been aware of this, now all of a sudden your GitHub account / email is a huge target for anyone that wants to do something malicious. | |||||||||||||||||
| ▲ | xocnad 4 hours ago | parent | prev | next [-] | ||||||||||||||||
All good for you to make those choices for yourself. Your response seems to be show ignorance of all the recent supply chain attacks that have occurred. You can imagine that given the situation with the shoe gifts that many high up members of the administration and cabinet members are running this app. | |||||||||||||||||
| |||||||||||||||||
| ▲ | rpdillon 4 hours ago | parent | prev [-] | ||||||||||||||||
The dependencies weren't vendored, meaning their behavior can change at any time if a malicious actor gains control of that third-party repo. This is bad for security. | |||||||||||||||||