There are a large number of packages (plus some classes) uploaded and updated in CTAN (other mirrors as well). How do the CTAN maintainers make sure the uploaded stuff is free of malicious code? Do they use a sophisticated script (like anti-virus checkers probably use) to parse the code to check for cleanness?
Asked
Active
Viewed 624 times
19
1 Answers
21
we don't apply any checks, since we know of no published "automatic" checks we could apply. most things submitted nowadays are simply too big for a visual check (such as i used to apply in the '90s when i first worked on ctan).
one hopes that people won't run anything with "standard" overwriting controls disabled, and we can't, of course, say anything about "unprotected" behaviour of packages (or anything else, for that matter).
in short caveat emptor...
wasteofspace
- 5,352
-
1barbara beeton's writing convention used here, please don't make any capitalization correction. – kiss my armpit Mar 18 '13 at 12:31
-
3@Karl'sstudents Can't wasteofspace protect their own publications, did you sign with the wrong username, or am I missing something obvious? – Mar 18 '13 at 12:49
-
@MarcvanDongen: I signed it by reading the context in which he/she talked with the word "We" rather than "I". – kiss my armpit Mar 18 '13 at 13:05
-
@Karl'sstudents Ms Beeton doesn't always write this way, see http://tex.stackexchange.com/questions/39442/tex-troff-a-reflection-on-the-history-of-computer-typography/39448#39448 – marczellm Mar 18 '13 at 14:56
-
1
-
@Karl'sstudents Actually I was talking about the capitalization :) Or is that connected to the I vs. We? – marczellm Mar 18 '13 at 15:11
-
1@marczellm: in my understanding or knowledge, she will use lower case for all characters when she talk on behalf of ams. correct me if i am wrong. – kiss my armpit Mar 18 '13 at 15:19
-
1@Karl'sstudents To the contrary, as stated at the very end of this TUG interview which I just found. – marczellm Mar 18 '13 at 15:52
-
1
-shell-escape? Do they pass them without any security check? – kiss my armpit Mar 18 '13 at 11:27-shell-escapesuch that users can easily distinguish them from the huge number of other safe packages and anticipate the potential of security vulnerability? – kiss my armpit Mar 18 '13 at 18:20-shell-escapedisabled, the security vulnerability is nullified. If somebody has it enabled, they are no better off with the flag unless an independent party verifies the flags i.e. assures people that packages X, Y and Z do not use the facilities of-shell-escape. But then somebody has to run the checks... If you rely on packages to self-declare, you might just as well use a malicious/non-malicious flag. Or did I misunderstand the idea? – cfr Feb 04 '14 at 01:21