By the way, the excellent discussion here got me thinking about the next logical step for vet: supporting private environments.
Running public scripts is great, but what about running deployment scripts from a private GitHub repo or setup scripts from an internal server?
Based on this, I've opened a new feature request to add authentication support to vet, with a roadmap that includes .netrc support, a VET_TOKEN environment variable, and a future goal of integrating with secret managers like HashiCorp Vault by reading tokens from stdin.
If you're interested in that direction, I'd love to get your thoughts on the feature request over on GitHub:
https://github.com/vet-run/vet/issues/4
Thanks again for all the great feedback!
The other thing is.. installer generally only runs once on a single machine, not sure how useful it is to “show the changes since last run”
You're absolutely right—vet's scope is focused on securing the installer script itself, not the binary it downloads.
The goal is to prevent the installer from being maliciously modified to, for example, skip its own checksum verification or download a binary from a different, malicious URL.
It's one strong link in the chain, but you're right that it's not the whole chain.
> How are you actually verifying the software that you install?
By installing it through a well-audited, cryptocraphically-signed and community-maintained package list with a solid security history. What?
The bug here isn't that "it's hard to make downloading scripts secure!", it's that people on macs (and a few other communities, but really it's just OS X culture at fault here) insist on developing software with outrageous hackery like this and refuse to demand better from their platform.
Fix that. Don't pretend that linting (!!) shell scripts pulled off the open internet is going to do anything.
Why do you think it’s OS X culture and not Rust culture? Popular rust tools like starship, atuin, and cargo itself ask you to curl an installer. They certainly didn’t invent this but they did re popularize it
Most non-Apple rust users get it via a Linux distro's package manager, or by building from source. And after installation cargo is, if not Debian-quality, reasonably secure vs. attack (sub-linux but better than npm, basically).
While there are surely exceptions, that nonsense about "just run this unauthenticated script URL" is something unique the the Mac experience. And it's horrifying.