1 comments

  • rtrgrd1 hour ago
    Confused here - setting up certs to MITM https requests to add a header seems like a decently big security risk?
    • Wuzzy16 minutes ago
      I agree that there are downsides to this approach. NVIDIA OpenShell does the same thing: <a href="https:&#x2F;&#x2F;docs.nvidia.com&#x2F;openshell&#x2F;latest&#x2F;sandboxes&#x2F;manage-providers#how-credential-injection-works" rel="nofollow">https:&#x2F;&#x2F;docs.nvidia.com&#x2F;openshell&#x2F;latest&#x2F;sandboxes&#x2F;manage-pr...</a>. I had wondered how they deal with the fact that client programs sometimes come with their own CA bundles. Turns out OpenShell sets various common environment variables (like REQUESTS_CA_BUNDLE used by Python&#x27;s requests) to try to convince as many clients as possible that the proxy&#x27;s certificate is to be trusted :) I would assume exe.dev does something similar.<p>(I was interested in this because I was actually working on something similar recently: <a href="https:&#x2F;&#x2F;github.com&#x2F;imbue-ai&#x2F;latchkey" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;imbue-ai&#x2F;latchkey</a>. To avoid the certificates issue, this library uses a gateway approach instead of a proxy, i.e. clients call endpoints like &quot;http(s):&#x2F;&#x2F;gateway.url:port&#x2F;gateway&#x2F;<a href="https:&#x2F;&#x2F;api.github.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;api.github.com&#x2F;</a>...&quot; which can be effectively hidden behind the &quot;latchkey curl&quot; invocation.)
    • HumanOstrich59 minutes ago
      Things aren&#x27;t just &quot;good&quot; or &quot;bad&quot;. There are tradeoffs to consider.