@j3rn @sanityinc I've been running on magit from 2011 for ... well, since 2011
and using subtrees to lock in all my packages in my dotfiles repo for nearly as long; works great and I highly recommend it
@j3rn @sanityinc I didn't do this from the start, but a couple years ago I started a policy of reading every line of elisp in a package before adding it
of course it has the effect of making sure I don't add a lot of elisp to my setup, but I think that's a good thing
@sanityinc @tzz And Emacs is by necessity a tool that have wide-ranging access to the system where it's run.
I have been worried about this very thing for a while, in fact every time I install a MELPA package.
@schaueho @alex @sanityinc @tzz I'm not worried about anyone getting access to root. All the sensitive data and actions are available to my regular user, ao that's what I want to protect.
The only approach that works reasonably well today is that of Qubes OS, but it still suffers from the limitation of not exposing any GPU functionality, which is a blocker for many usecases.
@sanityinc Then the risk of this is not increased (at least not too much) when considering root.
However, given that there are still files that only root can access and things that only root can change on a system, I actually think that usually the risk would be higher for root. But it's not a big point, agreed.
@loke @alex @tzz
@deech @sanityinc Maybe new accounts that suddenly open PRs en masse, that reference a known malware repo, to repositories related only by having a vulnerable configuration, and leave behind a picture of one Mr. Richard Long, could be detected as a malicious signal by the company that enjoys a near monopoly on open source.
Hey, look, another Copilot button!