So Just Anyone Can Make An AUR Package?

This whole discussion is basically telling everybody again that the AUR is anonymous. There are probably lots of bad guys with packages on the AUR and you dont know it. Knowing this “one guy” is just a good reminder about the overall threat level.

The lesson learned is clear: Check the PKGBUILD before you install anything from the AUR.You do not need to be a programmer to do this. Just check the “source” and the “patches” which are being used to build the package. If you trust the source, then go for it.

4 Likes

This comment is in reference to the comparison of using the AUR to build a package vs building it yourself. In other words, we are comparing packaging/installation methods.

The OP is feeling that the AUR is unsafe because anyone can post a package there. My comment is in direct reference to that.

The question of if the software itself is safe or not isn’t relevant to this particular comparison. If the software itself isn’t safe, whether you pull it from AUR, build it yourself, use a repo package or any other packaging mechanism makes no difference.

What I was discussing is if the AUR packaging is safe or not. This is because the packaging can inject unsafe things even if the software is 100% trustworthy.

Taken in context, the relevance of my comment is that the AUR is an extremely safe packaging source compared to other sources if you use it properly. I am not proposing that the AUR magically makes upstream sources safer to use.

With most packages, you need to trust the packager since you have no easy way of knowing what is inside. With AUR, you don’t need to trust the packager since you can review it yourself as part of the installation/update process.

1 Like

My comment was in relation to this:

No matter how well-written a PKGBUILD is (that is, it is not injecting anything nasty into the built package), no matter how much you review a PKGBUILD and how transparent the building mechanism is, there is still a difference between transparency and safety.

My point is with a perfectly fine and transparent packaging mecahanism, one could still end up building an unsafe package.

From AUR’s PKGBUILD transparency to regarding AUR as “the safest 3rd party repo” is a stretch in my thinking.

However your further explanation put forward some points in the light of which your initial comment can be interpret differently.

1 Like

Right, but you are taking that comment completely out of context.

That comment is part of a discussion, it isn’t meant to stand alone as an independent statement.

That being said, it specifically reads: “AUR is one of the safest 3rd party repos”. That should not imply that all the software in AUR is safe. It should imply, that compared to other 3rd party repos, AUR is one of the safest as long as your review the PKGBUILDs.

In no circumstance should that be intepreted as “All software in the AUR is safe if you review the PKGBUILD”

2 Likes

I could agree on this but with some “modifications”:

Compared to other 3rd party repos, AUR’s PKGBUILDs make the process of how a package is built and from what transparent to the user. In that sense it is the most transparent system.

It could potentially be the safest system as long as the user knows and trust what it is that goes into that package.

The latter, in my mind, requires that the user has a way of making sure about the “sanity” of the code from which the package is built with Arch’s transparent package building mechanism.

1 Like

We are making a relative comparison between package sources of the same software.

In context, the discussion was about when using a given piece of software, is it safer to get it from one source versus a different source.

In this context, transparency provides relative safety. One source can be safer than another given the same software.

2 Likes

Leave it to @pebcak and @dalto to take somone’s cringe moment thread and turn it into a serious discussion about the safety of the AUR.

:purple_heart:

5 Likes

Not sure it’s more transparent than SlackBuild scripts for Slackware or BSD port installed from source.

1 Like

It has bin a long time since I used those, but those do those display the changes and ask for confirmation as part of the update/installation process? Or, at least, have an option to do that?

Not for Slackware and I’m not sure for BSD.

Steam is Closed source application you cannot see the code you don’t know what is in that code

That would be more concerning if Gabe Newell went around publicly soliciting advice on how to write viruses to prove a strange point, but to my knowledge he hasn’t done that yet so steam is probably safe

said who multi billion company who got lawsuit and treat their fans like shit

This topic was automatically closed 2 days after the last reply. New replies are no longer allowed.