Replies: 2 comments 1 reply
-
Allowing people to run arbitrary commands as some security implications. That would need to be implemented very carefully. Your approach seems to be the best solution for now. |
Beta Was this translation helpful? Give feedback.
-
Interesting idea but dangerous to say the least, especially on hosted instances of miniflux. What's to stop someone from crafting together a malicious configuration? On a bare-metal Linux machine with poorly configured permission policies something like A solution could be to use a combination of environmental variables and user configurations. For instance: I reckon anyone who can provision a server with an executable program would have the possibility to alter the environmental variables passed on to miniflux, this feels like a better approach than having to maintain a black/whitelist on the server or within Miniflux codebase. |
Beta Was this translation helpful? Give feedback.
-
I've written a small scraper for a website that produces an RSS feed. This works well, but I have to host the scraper as a daemon. I thought it would be cool if Miniflux could invoke an executable to get a feed instead of making an HTTP request. Perhaps an
exec:///path/to/program
URL scheme.I think this would enable a few interesting use cases:
I'm not really sure this would be superworthwhile (it would be nice for me, though!), but perhaps someone can find more creative/powerful uses cases.
Beta Was this translation helpful? Give feedback.
All reactions