-
-
Notifications
You must be signed in to change notification settings - Fork 273
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
]add $PACKAGE_NAME#remotes/cache/pull/$NUM/head
works; a feature or a security hole?
#789
Comments
I think it's in general impossible to know what a git ref "means". The fact that a branch named So it's impossible to know if this is "unsafe" code or an actually desirable branch name from Pkg's perspective, and even if we did try to "block" things matching this pattern, GitHub may change their internal representation eventually. |
I was thinking to prepend |
I just tried to reproduce this and I couldn't. How are you seeing this behavior? |
Here is a quick oneliner to see it:
It seems that it works outside my laptop: JuliaPy/PyCall.jl#565 (comment) |
I would say this is a feature. |
There's no such thing as client-side security. |
I noticed that
]add $PACKAGE_NAME#remotes/cache/pull/$NUM/head
installs a not-yet-merged PR from GitHub where$PACKAGE_NAME
is a name of a registered package and$NUM
is the PR ID. I used it sometimes when recommending people to use a PR. Although it's handy for letting users try things out in the PR, it gives a wrong impression that this installs code from the official repository$PACKAGE_NAME
. But the truth is that it can be any code since anyone can send a PR. I think in the end users have to know what the command they use does, but I wonder if Pkg.jl wants to avoid random git ref to be specified.The text was updated successfully, but these errors were encountered: