logoalt Hacker News

woodruffw01/22/20251 replyview on HN

Apart from the snark (which is unwarranted), I can't even parse what you're saying.

(Mentioning sudo in the context of Homebrew suggests that you're one of those incoherent threat model people, so I'm going to assume it's that. So I'll say what Homebrew's maintainers have been saying for years: having a user writable Homebrew prefix is no more or less exploitable in the presence of attacker code execution than literally anything else. The attacker can always modify your shell initialization script, or your local Python bin directory, or anything else.)


Replies

saidinesh501/22/2025

I'm not much of a Mac user but I'm guessing the parent comment wanted readonly user install path so accidental/malicious rm -rf only affects the user data and not the installed programs?

Nothing to do with exploits as part of homebrew etc .

show 1 reply