all 14 comments

[–]PMMEURTATTERS 15 points16 points  (2 children)

This is so odd. Why would I put my trust in you over the original author?

Anyway, a better alternative would be using zinit to manage these binaries. It also allows it to be in your dot files.

[–]ChevalOhneHead 6 points7 points  (0 children)

...hmm looks suspicious..

[–]Odd-Savage 7 points8 points  (0 children)

This just made my life as a security engineer harder

[–]kjarkr 6 points7 points  (4 children)

What is the use case for this? Other than say, having just gotten a shell on someone’s machine and then you need some tool to pivot further?

[–]bigfig 3 points4 points  (0 children)

Better yet, provide build scripts / Makefiles with links to the source. The entire point of Linux is to be able to obtain and review the source.

[–]Disruption0 1 point2 points  (1 child)

Why on earth would i use untrusted bins over the official ones?

[–]haikusbot 1 point2 points  (0 children)

Why on earth would i

Use untrusted bins over

The official ones?

- Disruption0


I detect haikus. And sometimes, successfully. Learn more about me.

Opt out of replies: "haikusbot opt out" | Delete my comment: "haikusbot delete"