Last night while updating my system, I noticed that a random aur package my system depends on was orphaned in the aur. It’s some random deep-down dependency of another AUR package, and it’s not received any upstream commits in a while. Nice and stable, just needed an owner. I decided to adopt the package before someone else did.
It was kinda scary how simple it is to adopt an orphaned package. Create AUR account… click an email link… Done. If someone wanted to squat the package for malicious purposes, it would be stupidly simple.
I get that this is a problem for all community repos, not just AUR (npm, anyone?), but it’s still an unsettling prospect. I feel like it goes unacknowledged some times.
This is the main reason that one should learn to read PKGBUILDs. Any AUR helper like Yay or Paru should give the option. Just make sure that the package downloads from an official source and contains only the necessary build and install instructions.
But I agree. Some people treat the AUR as just another repository, when it most definitely is not.
This is something that I still need to learn about. What is a good starting point to learn how to read them?
It’s a shell script. Somebody wrote down the shell commands to download, extract, compile from source code. If you can do shell stuff then you’re about 1/2 way there. If you’ve ever manually compiled from source code then you’re all the way there pretty much.
It’s quite simple since there isn’t any other abstraction to learn than what many Linux users already know. Shell commands and compiling stuff.
Probably the one thing that might be foreign is variable and functions of shell scripting.
In fact, exactly that has already happened in past.
https://thehackernews.com/2018/07/arch-linux-aur-malware.htmlOn June 7, a malicious user nicknamed “xeactor” adopted an orphaned package (software without an active maintainer) called “acroread” which functions as a PDF viewer, and modified it to add malicious code.
So definitely check what you’re installing.
It’s important to actually read what’s in the packages. The AUR saves me time installing that I can use up front confirming.
This is why you always read AUR comments and package file before installing anything from the AUR.
It’s only scary if you think the AUR is inherently trustworthy. It’s not, and every piece of official documentation and various wikis make it abundantly clear it’s not. (If you see somewhere that doesn’t point it out or edit it so it does.)
The AUR is barely better than pasting J Random Hacker’s ‘curl http://foo | sudo bash’ code you see somewhere to install something. And that’s only because at least the AUR makes it easier to inspect what’s about to run and what changed.
Yup. If I want to install something “app-like” and it isn’t in the main repos I tend to go with the flatpak over the AUR for that reason.
Hmm, that’s a good point. Were you able to take over the existing package? With npm and some other self-publishing repos you can squat a name that hasn’t been taken, but an existing package cannot be taken over without the original owner’s credentials.
I had full control over the pkgbuild as soon as I uploaded an ssh key to my AUR account. I did end up pushing a small update that fixed a missing download link, but I could just have easily changed the download artifacts. I know that some AUR helper encourage users to check pkgbuild diffs, but I’m sure many (most) people skip that step.