On PerlMonks, on many SOPWs I have written I have placed "no CPAN please" in them. The community then responds to me with a boilerplate "you too can install CPAN modules". I've been wondering if there is any logic to my "no CPAN" requirements that I have been putting up for 13 years on PerlMonks.
Scenario one, with CPANTesters and other people who automatically build modules, and the fact that PAUSE tarballs are unmoderated, has anyone ever been caught in the 17 year history of CPAN releasing a benign module with a rootkit, backdoor, virus, or "calling home"?
Scenario two, has anyone released a truly malicious module without any POD or any redeeming qualities that will attempt to trash the system when its Makefile.pl is run automatically by CPANTesters?
And scenario 3, if someone did release a tarball with a kernel privilege escalation exploit in it, what will CPAN, PAUSE, and Perl community do? and to what degree will that tarball be scrubbed off the internet?
Before you ask what is my mission, I proclaim that I have been sent here on an edict from the House of PHP to proselytize all you heathens to the salvation of my Most Honorable Lord Phalanger.
In reply to Malware on CPAN by Anonymous Monk
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |