this post was submitted on 08 Dec 2025
14 points (100.0% liked)

Asklemmy

51663 readers
427 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy 🔍

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 6 years ago
MODERATORS
 

Without going through the whole source code. You can just look up the information on the web, but how do you know whether to trust that information?

(Assuming no security audit has been listed on the website, or the audit seems outdated.)

you are viewing a single comment's thread
view the rest of the comments
[–] j4k3@piefed.world 10 points 1 week ago (1 children)

The easiest way is to always use a DNS whitelist firewall on a external device on your network. It is a pain in the ass to manage that list, but you'll log and block every unexpected connection.

Otherwise, you can do a basic grep for "http" in the source, or even by scanning a binary for strings. This vector is easily mitigated by an attacker using encryption or a simple cypher, but it will catch a lot of script kiddies.

[–] wabasso@lemmy.ca 3 points 1 week ago

(Not OP) I didn’t think there would be such a powerful simple answer to this, but that’s a great idea. Thanks!