dwt

joined 2 months ago
[–] dwt@feddit.org 1 points 1 week ago

If you do want to try, just start a docker container and try inside there. That should negate all risk

[–] dwt@feddit.org 3 points 1 week ago (1 children)

Couldn’t get single quotes to type on my phone, but best to always use them for problems like that, to completely get rid of shell interference.

[–] dwt@feddit.org 17 points 1 week ago* (last edited 1 week ago) (5 children)
rm ./—rf\ \*

Am I missing something?

[–] dwt@feddit.org 3 points 2 weeks ago

It’s easy to set the path to include the venv in the Dockerfile, that way you never have to activate, either in the run line, nor if you exec into it. Also this makes all your custom entry points super easy to use. Bonus, it’s super easy to use uv to get super fast image builds like that. See this example https://gist.github.com/dwt/6c38a3462487c0a6f71d93a4127d6c73

[–] dwt@feddit.org 10 points 3 weeks ago

Did you catch that a Microsoft employee found the xz exploit?

[–] dwt@feddit.org 2 points 1 month ago* (last edited 1 month ago)

TIL that pillow-heic is a thing. Thanks!