`npx create-framework-app` Is prime for disruption where instead of downloading and executing unknown code it can defer the work to a cloud function that generates a file tree and ships it down to the customers machines. This changes the trust model significantly.
-
-
I think this is actually *less* secure. With open source boilerplate, at least other people can review the code for hacks. With a server generating a template, you could have the server insert a rootkit only for a small subset of targeted users.
-
To be clear nothing preventing this from happening today with life-cycle scripts. Anyway I agree there are cons to this approach as well. However I still think downloading code to execute a scaffold command feels odd.
- 2 more replies
New conversation -
-
-
yes, the hypothesis is that the shipped scaffold to the user will have a far smaller footprint compared to the code for the scaffold + the actual scaffolded code. Additionally with this approach a download of files requires no runtime to view the output.
-
So the expectation is that someone still hand reviews the generated code? What do you mean it requires no runtime? You eventually execute it.
End of conversation
New conversation -
-
-
I share Seb's point. You're still downloading and executing whatever it is makes the call to the cloud service and then running the generated code without reading any of it.
-
Like, two days ago they found a privilege escalation bug from unchecked ints in *sudo*, if sudo went unread then nobody is ever getting around to reading JavaScript.
- 1 more reply
New conversation -
-
-
Simply, it may make folks feel safer, thereby creating and improved market for those who want to exploit it
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
he/him 