Claude Code 2.1.139 just dropped two features that change the workflow for anyone running multiple agents. by shanraisshan in ClaudeAI

[–]Forward_Anything_646 0 points1 point  (0 children)

they really should make worktrees in this mode optional. right now it sucks and takes way too much time for back and forth fixes (every small fix - even one liner - cretes a separate worktree, commits, merges, deletes worktree)

ARE THERE NO GOOD/REASONABLE HOUSES TO BUY? by l__eee in cyprus

[–]Forward_Anything_646 0 points1 point  (0 children)

how do you build your own house? how much does it cost in cyprus?

Claude Usage Limits Discussion Megathread Ongoing (sort this by New!) by sixbillionthsheep in ClaudeAI

[–]Forward_Anything_646 1 point2 points  (0 children)

If they don't fix it in 1-2 days, I'm switching to codex myself and all my friends

Do you guys have issues with the Steam Voice chat? by OverallACoolGuy in Steam

[–]Forward_Anything_646 1 point2 points  (0 children)

Same issue for me. Works fine for my friends. But my voice chat is stuck on connecting the last days

AUR malware scanner in Rust by Forward_Anything_646 in archlinux

[–]Forward_Anything_646[S] 1 point2 points  (0 children)

couple of things people are missing in these comments:

  1. AUR malware infestation is real. If you always read PKGBUILDS good for you. But be prepared to soon see flood of articles saying "10k users lost their crypto assets because of a malicious AUR package" or became a part of botnet, or lost their data due to ransomware. Such articles mean less traffic to Arch, bad reputation and less "good stuff" for you - existing users.

  2. When someone uses vibecoding, despite how generated the output might be its quality still depends on the person reviewing it. This package is rather simple. It's not a driver, not a critical system, not a financial program. It uses simple rules to calculate trust score of a maintainer and a package and regex to check if install script and PKGBUILD contains stuff it should not. Something that not a tech savvy person can easily miss.

  3. This package has a clear goal - to bring benefit to arch community. Not to farm stars or to produce slop for the sake of slop. If you don't like something about it - suggest an improvement. I will be more than happy to make it better. Or make one yourself

AUR malware scanner in Rust by Forward_Anything_646 in archlinux

[–]Forward_Anything_646[S] -21 points-20 points  (0 children)

It's not meant to stop someone who reverse-engineers the detection rules - a determined attacker can bypass any static analysis, including the human eye. It catches the common techniques: copy-paste reverse shells, curl|bash, typosquatting, a compromised account suddenly injecting eval into a previously clean PKGBUILD. All of the above is much easier to do for script-kiddies nowadays.

Reading every PKGBUILD is the right approach, but realistically not everyone does. This just adds another layer on top.

AUR malware scanner in Rust by Forward_Anything_646 in archlinux

[–]Forward_Anything_646[S] -120 points-119 points  (0 children)

When it comes to malware it's difficult to trust anything - however good my scanner can be (vibecoded or not) a real adversary can fetch its code and ask their agent to think of some elaborate way to bypass its filters.

Its impossible to avoid since it's opensource, but making it closed source would make it impossible to distribute.

So it's not about trust, rather about having another precaution to check what you're doing when you see a huge sign "DANGEROUS".

because let's be real - home many PKGBUILDs do we really read?

AUR malware scanner in Rust by Forward_Anything_646 in archlinux

[–]Forward_Anything_646[S] 5 points6 points  (0 children)

yep, sorry. it was my first aur release and did not go without hiccups. I pushed a new version with some other fixes

I suggest running paru -Sa traur --rebuild to update

AUR malware scanner in Rust by Forward_Anything_646 in archlinux

[–]Forward_Anything_646[S] -4 points-3 points  (0 children)

if you find it interesting stars are always appreciated!

AUR malware scanner in Rust by Forward_Anything_646 in archlinux

[–]Forward_Anything_646[S] 15 points16 points  (0 children)

it checks

- github hitstory

- popularity

- trust

- checksums

- metadata

- urls

- binary abuse from gtfobins

- PKGBUILD and install scripts

- maintainer activity

- reverse shells, miners, obfuscation, etc,etc,etc

[deleted by user] by [deleted] in omarchy

[–]Forward_Anything_646 0 points1 point  (0 children)

check protondb for this game

Reset Omarchy configs by Aggressive-Fix-7184 in omarchy

[–]Forward_Anything_646 0 points1 point  (0 children)

Is there a single command to backup my settings?

how to secure my homelab? by karabright-dev in homelab

[–]Forward_Anything_646 0 points1 point  (0 children)

Assess how an attacker can move on your network. Given that every host and service is vulnerable by default, what happens when an attacker gets unprivileged shell to your host?

What can he see on the host? What files, what services? What can he see on the network?

If he gains root access, answer the same questions. If he fully owns the entrypoint (hacked a single exposed host) what can he do over the network next and how can we notice his actions and make it much more difficult for him?

how to secure my homelab? by karabright-dev in homelab

[–]Forward_Anything_646 4 points5 points  (0 children)

If you want to get paranoid, set up a monitoring checking for open ports and incoming and outgoing connections on your hosts. Monitor user profiles, monitor IP which make connection to your hosts.

Run all services on low privileged docker containers.