curl -s example.com/install | sh
While I appreciated the elegance, it set off warning bells. Despite this initial reaction I could’t come up with a reason why it was any less secure than other installation methods. In fact, I read a very logical argument that this method was actually more secure from the highly respected Paul Irish:
@igrigorik compared to .pkg, npm preinstall, I'd say curl _ | sh is the closest to view-source we have for installers. for devs, it's ideal.
— Paul Irish (@paul_irish) September 3, 2012
Today I realized at least once case that could validate those initial warning bells. Take a look at this proof of concept:
curl -s jordaneldredge.com/projects/curl-proof/install|sh
I’ll wait while you paste the script url into your browser and make sure it’s not going to do anything naughty…
Now that you’re sure the line is safe to run, paste it into your shell (I
dare ya!). Or, if you are a big wimp, pipe the output to
cat instead of
curl -s jordaneldredge.com/projects/curl-proof/install|cat
As you can see Curl returned a different script than the one you saw in your browser. This is achieved by checking for Curl’s user-agent and, when found, serving a different file.
Of course, the whole point is pretty much moot because the install script is probably installing lots of other code that you haven’t reviewed, so you are wouldn’t be running this code unless you already trusted the author. However, be aware that you may be lulling yourself into a false sense of security because you appear to have the code right infront of you.