PkgForge
GithubSoar
  • Orgs
    • PkgForge (Core)
      • About
      • Projects
        • Soarpkgs
        • bincache
        • pkgcache
      • People
    • PkgForge-Community
    • PkgForge-Dev
      • Projects
        • Anylinux-AppImages
      • People
    • PkgForge-Security
      • Projects
        • CertStream
  • Soar
    • Soar (Docs)
    • Comparisons
      • 1. Candidates
      • 2. Dependencies
      • 3. Packages
      • 4. Security
  • Formats
    • Binaries
      • Dynamic
      • Static
        • Build Notes
          • Cargo (Rust)
          • GoLang
          • Make
          • Nim
          • Nix
          • Vlang
          • Zig (Musl)
        • Build Tests
    • Packages
      • Archive
      • AppBundle
      • AppImage
      • FlatImage
      • GameImage (TBD)
      • NixAppImage
      • RunImage
      • Errors & Quirks
        • Fonts
        • Fuse
        • Namespaces
        • Zsync
  • SBUILD
    • Introduction
    • Specification
      • 0.Prerequisite
      • 1.Shebang
      • 2.Pkg
      • 3.Version
      • 4.AppID
      • 5.BuildAsset
      • 6.BuildUtil
      • 7.Category
      • 8.Description
      • 9.Desktop
      • 10.DistroPkg
      • 11.HomePage
      • 12.Icon
      • 13.License
      • 14.Maintainer
      • 15.Note
      • 16.Provides
      • 17.Repology
      • 18.SourceURL
      • 19.Tag
      • 20.x_exec
    • Instructions
      • ENV_VARS (x_exec.run)
      • ENV_VARS (SBUILDER)
      • NEEDED_FILES
      • Examples
  • Repositories
    • soarpkgs
      • Contribution
      • Copy of DMCA | Copyright (Cease & Desist)
      • Differences
      • FAQ
      • Infra
      • Metadata
      • Package-Request
      • Security
    • bincache
      • Cache
      • Contribution
      • Differences
      • DMCA | Copyright (Cease & Desist)
      • FAQ
      • Infra
      • Metadata
      • Package-Request
      • Security
    • pkgcache
      • Cache
      • Contribution
      • Differences
      • DMCA | Copyright (Cease & Desist)
      • FAQ
      • Infra
      • Metadata
      • Package-Request
      • Security
    • external
      • AM
      • cargo-bins
      • appimage.github.io
      • AppImageHub
    • Nests
  • Contact
    • Chat
Powered by GitBook
On this page
  • Recommended Reading
  • Trust but Verify
  • Don't Trust Us
  • Spooky Things

Was this helpful?

  1. Repositories
  2. bincache

Security

It is NEVER a good idea to install random binaries from random sources.

PreviousPackage-RequestNextpkgcache

Last updated 4 months ago

Was this helpful?

Recommended Reading

Check these HackerNews Discussions

The amount of work and the near impossibility to ensure that every source used, provide reproducibility, is infeasibly impractical. Even if it were practical, not every pkg/tool provides source code, so this is impractical.


Trust but Verify

!# View Build Script
soar inspect "<PACKAGE>"
!# View Logs
soar log "<PACKAGE>"

Since, the builds aren't reproducible, it's unlikely you will end up with the same checksums if you rebuild/rerun the Build Script


Don't Trust Us

  1. Repos that already publish pre-compiled binaries/packages, . You can compare checksums.

  1. Fork our repos, read & audit our code, setup all the infrastructure, & run all the scripts & build on your own servers


Spooky Things

  1. Second, check the affected Binary's Build Script, the latest BUILD.log & finally CHECKSUMS as described in above sections.

  2. Third, if you find everything is as it should be, create an Issue & attach Verifiable and Reproducible Proof.

  1. Once again, to reiterate, the source code of the packages or tools compiled here is not controlled in any way.

It cannot be guaranteed that the upstream source is entirely safe or legitimate. It's upto you to exercise basic common sense and vigilance when using these binaries/packages.

Check the Package Page & Look for Build Log :

If you get a 404 or it errors out, you can get the full logs here:

You can use to verify any of our artifacts using the Public Key:

All our CI workflows produce attestations for all of the artifacts:

Devscripts:

Dockerfiles:

For , Debug Symbols, Comments are stripped, this will change the checksum

For , Icons, Desktops (& even repacking) are edited/fixed & patched, this will change the checksum

Follow this guide to analyze a malicious binary/package:

First, it's important to verify that the alert is and truly confirm that indeed the

It's important to NOTE that WE DO NOT WRITE/OWN the binaries we compile and CAN NOT BE HELD RESPONSIBLE if the Developer has DELIBERATELY made it Malicious. If that's the case, it's best to Notify Us (Create an Issue OR ) & also like here:

All the follow to mitigate , so a single Malicious Binary is more probable than ALL the binaries being infected.

https://blogs.gentoo.org/mgorny/2021/02/19/the-modern-packagers-security-nightmare/
https://news.ycombinator.com/item?id=26203853
A cautionary tale from the decline of SourceForge
Downloading PuTTY Safely Is Nearly Impossible (2014)
Post-xz backdoor, how to know when to trust niche-distro binaries?
Hysp (Frontend PKG Manager)
featured on HN
https://news.ycombinator.com/item?id=38457926
The XZ Backdoor
Reproducible Builds
https://pkgs.pkgforge.dev/
https://pkgs.pkgforge.dev/
https://meta.pkgforge.dev/bincache/logs/
minisign
https://raw.githubusercontent.com/pkgforge/bincache/refs/heads/main/keys/minisign.pub
Build Attestations & Provenance
https://github.com/pkgforge/bincache/attestations
https://github.com/pkgforge/devscripts
https://github.com/pkgforge/devscripts/tree/main/Github/Runners
Binaries
Packages
https://book.hacktricks.xyz/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis
NOT a False Positive
Binary is Malicious
Contact Us
Report To Github the Original Repo
https://github.com/orgs/community/discussions/63603
Build Servers
Standard Security Hardening
Supply Chain Attacks