R Tyler Croy 🦀 on Nostr: The rc.d/init system used by #FreeBSD and #Alpine allow a chain of script invocation ...
The rc.d/init system used by #FreeBSD and #Alpine allow a chain of script invocation to do the work.
This design would allow for more testable binaries or other scripting languages, which aren't as runs-with-scissors dangerous as (ba)sh.
While bash scripts don't _typically_ delete your trusted data, I've seen empty variable expansion pwn a number of people running all types of scripts.
rc.d/init can easily use something not named for what you do to your head after using it.
Why don't we?
Published at
2024-06-23 21:56:28Event JSON
{
"id": "ce0e344b24dff2de1fcb96cb3d3085bc5118ed32d89114c26a0a2226a911bbaa",
"pubkey": "6a3aedb514c2f2bf0fc4a03b6b5efeb6398d7ed98ba557cad9b507a1afc6d0e6",
"created_at": 1719179788,
"kind": 1,
"tags": [
[
"t",
"freebsd"
],
[
"t",
"alpine"
],
[
"proxy",
"https://hacky.town/users/rtyler/statuses/112668166591609452",
"activitypub"
]
],
"content": "The rc.d/init system used by #FreeBSD and #Alpine allow a chain of script invocation to do the work.\n\nThis design would allow for more testable binaries or other scripting languages, which aren't as runs-with-scissors dangerous as (ba)sh.\n\nWhile bash scripts don't _typically_ delete your trusted data, I've seen empty variable expansion pwn a number of people running all types of scripts.\n\nrc.d/init can easily use something not named for what you do to your head after using it.\n\nWhy don't we?",
"sig": "f7689d3127eac36c62f67e478ac8e1f94a8823872753479b897203bce426de70437f38015172cfe43fa479e3775d7a11c41772669b87f210751be36b454a49f2"
}