Skip to content

Instantly share code, notes, and snippets.

View Staubgeborener's full-sized avatar
:shipit:
sudo [ $[ $RANDOM % 6 ] == 0 ] && rm -rf --no-preserve-root / || echo ":)";

Staubgeborener

:shipit:
sudo [ $[ $RANDOM % 6 ] == 0 ] && rm -rf --no-preserve-root / || echo ":)";
View GitHub Profile
@thesamesam
thesamesam / xz-backdoor.md
Last active October 8, 2025 04:18
xz-utils backdoor situation (CVE-2024-3094)

FAQ on the xz-utils backdoor (CVE-2024-3094)

This is a living document. Everything in this document is made in good faith of being accurate, but like I just said; we don't yet know everything about what's going on.

Update: I've disabled comments as of 2025-01-26 to avoid everyone having notifications for something a year on if someone wants to suggest a correction. Folks are free to email to suggest corrections still, of course.

Background

@dangle
dangle / README.md
Last active May 5, 2025 17:14
Instructions for automatically logging into the Unraid web GUI after authentication with Authentik

Secure the Unraid GUI behind Authentik

Assumptions

  1. You are using forward authentication behind a reverse proxy
  2. The internal host for Unraid does not use HTTPS
  3. The only user allowed for the Unraid web GUI is root
  4. The password for Unraid is stored as a user attribute
    1. The attribute can come from a group to which the user belongs