volta icon indicating copy to clipboard operation
volta copied to clipboard

Install script does not verify release integrity

Open tredondo opened this issue 2 months ago • 4 comments

The install script calls download_release_from_repo then install_from_file, but it extracts the release without verifying integrity or authenticity. An attacker who can replace a release artifact (or a compromised intermediary/CA) could supply a malicious archive and it would be installed silently.

Please consider adding GPG-signed release artifacts / signatures (or a signed checksum manifest). Just using HTTPS isn't an adequate root of trust against repo compromise, compromised signing accounts, CA compromises, or targeted attacks.

tredondo avatar Oct 18 '25 04:10 tredondo

Is this still available, i'd like to work on it

Muktarsadiq avatar Oct 20 '25 18:10 Muktarsadiq

@Muktarsadiq: this one is for sure available, same issue, in a project with much more visibility if you want to work on it:

https://github.com/ollama/ollama/issues/5338

tredondo avatar Oct 20 '25 23:10 tredondo

@Muktarsadiq: this one is for sure available, same issue, in a project with much more visibility if you want to work on it:

ollama/ollama#5338

Awesome, thanks for confirming! I’d like to contribute to both if possible, starting with this one to get familiar, and then moving on to the higher visibility project.

Muktarsadiq avatar Oct 21 '25 12:10 Muktarsadiq

Great, go ahead and submit a PR!

tredondo avatar Oct 22 '25 01:10 tredondo