You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Some parts of the build process download external dependencies without verifying a checksum. This means that if any of our external dependencies or their download server is compromised, the next VisiCut build will automatically pick this up.
Good example:
Download of JDK for Windows/Mac setup.
I think you might be a little too concerned in this regard. In the software industry "downloaded from a static GitHub URL" is even sufficient. It's rather unlikely that someone would manage to work around all the security features (TLS, HSTS even). I can relate to the wish for a static build so that new ones don't break things (even if that is rather uncommon in the world of AppImages, for instance), but checking hashes is a bit over the top.
Edit:
only weak SHA1 hash, and only a short part of it
Of couurse, the hash is not a security measure. It's just to install the right "version", not to make sure it wasn't tampered. You'd have to build your own thing there to reliably install this.
Regarding "static GitHub URL": Anyone with sufficient access to the dependency repository could change the content of the release artifact, and then we would silently download and run that new content. No need to hack GitHub :-)
Some parts of the build process download external dependencies without verifying a checksum. This means that if any of our external dependencies or their download server is compromised, the next VisiCut build will automatically pick this up.
Good example:
Download of JDK for Windows/Mac setup.
VisiCut/distribute/distribute.sh
Line 111 in 8797012
Insufficiently checked parts:
VisiCut/.github/workflows/github-build.yml
Line 63 in 8797012
VisiCut/distribute/Dockerfile
Line 16 in 8797012
The text was updated successfully, but these errors were encountered: