是否存在Ruby特洛伊像木马一样的风险?

编程入门 行业动态 更新时间:2024-10-23 15:21:59
本文介绍了是否存在Ruby特洛伊像木马一样的风险?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧! 问题描述

我正要安装一个我从未听说过的人的Ruby宝石。但有些让我想到这个人是谁?。是否有任何Ruby宝石可以在您的机器上访问私人数据并将其传输到别处 - 因为宝石系统可以访问互联网?或者是否有保护措施呢? 当然有。您正在计算机上安装软件,该软件使用调用它的脚本/用户的权限运行。在纯Ruby中找到恶意代码比在二进制包中更容易。但是,如果您认为源代码检查是确定恶意代码的有效方法,请查看举手的C比赛。这就是说,如果你想编写恶意软件,那么比Ruby的宝石更有效的交付系统。如果存在的实际恶意宝石的数量是0,并且因此这个恶意的可能性同样是0,那么我不会感到惊讶......

请参阅: rubygems/read/chapter/14#page61

I was just about to install a Ruby gem by someone I hadn't heard of. But something made me think "Who is this guy?". Is there any risk of a Ruby gem accessing private data on your machine and transmitting it elsewhere - since the gem system has Internet access? Or are there protections against this?

解决方案

Of course there is. You're installing software on your computer that runs with the privileges of the script/user that calls it. It's probably easier to spot malicious code in pure Ruby than in binary packages. But if you think source inspection is a guaranteed way to spot malicious code, check out the under-handed C contest.

That said, if you want to write malware there are more effective delivery systems than Ruby gems. I would not be surprised if the number of actual malicious gems in existence is 0, and thus that the probability that this one is malicious is likewise 0...

See: rubygems/read/chapter/14#page61

更多推荐

是否存在Ruby特洛伊像木马一样的风险?

本文发布于:2023-07-16 23:02:51,感谢您对本站的认可!
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。
本文标签:特洛伊   是否存在   木马   风险   Ruby

发布评论

评论列表 (有 0 条评论)
草根站长

>www.elefans.com

编程频道|电子爱好者 - 技术资讯及电子产品介绍!