This pattern is risky since it's executing an arbitrary shell script as root on the target machine, so its use should be discouraged. This pattern was the vector for the recent codecov attacks. This script seems especially risky since it's on an AWS S3 bucket, which I assume is totally out of IBM control.
I noticed the script does install an apt repository, so I suggest those sections to be rewritten to suggest installing the sysdig apt repository and writing a configuration file.
We noticed in these docs that it's suggested to use the
curl | sudo bash
pattern to install the sysdig agent.The exact command:
This pattern is risky since it's executing an arbitrary shell script as root on the target machine, so its use should be discouraged. This pattern was the vector for the recent codecov attacks. This script seems especially risky since it's on an AWS S3 bucket, which I assume is totally out of IBM control.
I noticed the script does install an
apt
repository, so I suggest those sections to be rewritten to suggest installing the sysdigapt
repository and writing a configuration file.