• MyNameIsRichard@lemmy.ml
    link
    fedilink
    arrow-up
    49
    ·
    edit-2
    1 day ago

    The malicious packages were found and removed quite quickly. Also anyone who doesn’t blindly install from the AUR would have seen a suspicious .lol url. I suppose that a genuine package using a .lol url isn’t impossible, it’s just very unlikely,

    These attacks do demonstrate the strength and weakness of the AUR, that anyone can upload anything at any time. The same as flathub and the snap store. Treat all of them with appropriate caution.

    • Karna@lemmy.mlOP
      link
      fedilink
      arrow-up
      21
      arrow-down
      2
      ·
      1 day ago

      Flatpak does have a concept of Verified Publisher. Many distros ship flatpak app store with default filter set to Verified Publisher only.

      • Daniel Quinn@lemmy.ca
        link
        fedilink
        English
        arrow-up
        18
        ·
        1 day ago

        That sounds like a nice feature we could use for the Aur actually. We already have the votes value, but some sort of verification body could help rescue the Aur’s reputation.

      • Cricket [he/him]@lemmy.zip
        link
        fedilink
        English
        arrow-up
        7
        ·
        1 day ago

        Many distros ship flatpak app store with default filter set to Verified Publisher only.

        Also, if your distro doesn’t do this, you can do it yourself. You can modify, for instance, KDE Discover’s flathub repo to use the verified subset.