Slightly safer vibecoding by adopting old hacker habits
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户已经给出了文章的英文内容和一个示例的总结,我需要理解文章的主要内容,然后进行简洁的总结。 首先,我通读一下文章。文章主要讨论了Python生态系统中的供应链攻击、提示注入风险以及“ vibe coding”对开发机器的安全影响。作者提到他在使用一种特定的开发环境,包括租用服务器、SSH连接、使用screen或tmux会话,以及使用像Claude这样的编码代理。他还提到通过分叉仓库来降低供应链攻击的风险,并讨论了这种方法如何减少主要秘密的丢失,如Claude凭证。 接下来,我需要将这些要点浓缩到100字以内。重点包括:作者的开发环境设置、使用SSH和tmux、避免在开发服务器上存储秘密、通过分叉仓库降低风险、以及这种方法如何减少供应链攻击的影响。 然后,我参考用户提供的示例总结:“作者介绍了一种安全的远程开发环境设置,通过SSH连接到服务器并使用screen/tmux会话进行开发。该方法避免在开发环境中存储敏感信息,并通过分叉仓库降低供应链攻击风险。这种方式将潜在的安全威胁限制在开发虚拟机层面,同时减少了提示注入等安全问题的影响。” 这个总结已经很简洁了,但可能还可以进一步优化以达到更少的字数。 最后,我整理出最终的总结:作者介绍了一种安全的远程开发环境设置,通过SSH连接到服务器并使用screen/tmux会话进行开发。该方法避免在开发环境中存储敏感信息,并通过分叉仓库降低供应链攻击风险。这种方式将潜在的安全威胁限制在开发虚拟机层面。 </think> 作者介绍了一种安全的远程开发环境设置,通过SSH连接到服务器并使用screen/tmux会话进行开发。该方法避免在开发环境中存储敏感信息,并通过分叉仓库降低供应链攻击风险。这种方式将潜在的安全威胁限制在开发虚拟机层面。 2026-3-25 04:2:0 Author: addxorrol.blogspot.com(查看原文) 阅读量:5 收藏

I have seen a lot of public discussion around supply-chain attacks on the Python ecosystem, prompt injection risks when using coding agents, and general worries about the security implications of "vibe coding" for the development machine.

In some of these discussions I find myself puzzled as to what problem is being solved - and it took me a while to realize that my failure to understand lies in the development setup that I tend to use.

In this blog post I'll quickly explain my development setup.

The setup is pretty simple:

  1. The actual development happens on a rented server (or a VM on that server).
  2. In order to do development, I SSH into that server with key-forwarding for my github keys enabled.
  3. I perform my development on the server by attaching to a screen or tmux session.
  4. I used to just use vim with various extensions, but with the advent of coding agents I also use claude code etc. nowadays.
  5. I avoid keeping secrets inside the development VM or on the development server.
  6. I let the agent churn away on problems for extended periods of time while I am detached from the tmux/screen.

A setup like this reduces a large number of supply-chain attacks to - at worst - compromise the development VM.

There is still a significant risk of the github key forwarding being abused to compromise the upstream main repository.

The way around this is a bit cumbersome, but not much different from what many open-source projects already do: You keep a main repository, and you *fork* a development repository from it. Then you do all your development on the dev repository, and when you're done in your development branch, you issue a cross-repository pull request.

Obviously, a human needs to go through that PR with a fine comb - but this is something you want to do for insider risk etc. anyhow, so your risk profile changes only marginally.

In a setup like this, the main secret that you'll lose in a supply chain attack are your Claude credentials. And you don't need to worry about prompt injection into your coding agent too much, and can just focus on writing code.

Interestingly, the development model of "SSH into a machine and attach to a screen session" was popularized by the hacker subculture (as in "computer break-in" subculture) since historically it was never a good idea to have data on machines you physically own. SSH'ing into a random machine in a different country that law enforcement couldn't easily get access to was a reasonable way of keeping your hands clean. I mainly switched to that development model because I almost always need long-running compute and was travelling a lot, and with agent-first development the model is seeing a bit of a resurgence.


文章来源: http://addxorrol.blogspot.com/2026/03/slightly-safer-vibecoding-by-adopting.html
如有侵权请联系:admin#unsafe.sh