As a person who regularly runs pip install on my main desktop, I am definitely worried about arbitrary code execution that happens when you pip install. Sure I can run everything inside the container, but given that I do most of my work in python, I think that is too restrictive...
> As a person who regularly runs pip install on my main desktop, where I am worried about arbitrary code execution that happens when you pip install.
We've open-sourced a sandbox and wrapped the Phylum CLI with it so you can do something like `phylum pip install <pkgName>,` it'll check our API first for known malware, then if it appears clean, will perform the installation in the sandbox. You can specify what the sandbox is allowed to touch in a TOML file.
Does the safety-oriented Rust community do this _automatically_?
hopefully somebody builds a disk snitch. would love to buy that.