Aqua Nautilus researchers have identified a security issue that arises from the interaction between Ubuntu’s command-not-found package and the snap package repository. While command-not-found serves as a convenient tool for suggesting installations for uninstalled commands, it can be inadvertently manipulated by attackers through the snap repository, leading to deceptive recommendations of malicious packages.

  • merthyr1831@lemmy.world
    link
    fedilink
    arrow-up
    10
    ·
    10 months ago

    Nope. It’s automated and doesnt detect malicious name-squatting (what caused the last security drama within snap)

    Doesn’t help that unlike flatpak, snaps are pretty much exclusively used on Ubuntu so many Devs won’t bother porting their apps to it so snaps are rife with dodgy repacked apps and people squatting official names of popular flatpak apps

      • merthyr1831@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        10 months ago

        FWIW Flatpak also does it automated, but as others said they manually verify new entries, and since it’s such a widely adopted standard there’s less opportunity to name-squat a popular app that isn’t already available.

        I don’t know what flatpak does to stop, say, someone releasing a legit/dummy app to pass manual verification before replacing it with a malicious app and a new name, so can’t comment on how effective their security is beyond the initial release