Comment by em-bee
1 day ago
only passwords that you type after logging in. but if you can't trust the remote system then i don't think OSC 52 is the only way to do that.
1 day ago
only passwords that you type after logging in. but if you can't trust the remote system then i don't think OSC 52 is the only way to do that.
You are misunderstanding OSC 52. A malicious/compromised SSH host can simply repeatedly print the OSC 52 paste command, causing the compliant terminal to repeatedly send any copied text to the remote system.
Everything in your comment is true regardless of OSC 52 support, though. OSC 52 just increases the attack surface for the sake of convenience.
oh, i didn't know about paste. mainly because i am confused why that is even needed. i get the application running inside the terminal needing to have a way to send a selection to the the terminal, but pasting into an application already worked without OSC 52, so why did they add a function to pull from the paste buffer?