Potential security issues related to atop monitoring software.

Viewed 60
The discussion centers around **atop**, a monitoring tool that installs a persistent kernel module (`netatop.ko`) and a daemon (`netatopd`) that runs with root privileges. Commenters express concern over potential security vulnerabilities, particularly the possibility of installed backdoors or exploitable flaws in the kernel module. The mention of repositories tied to regions like mainland China and Russia raises alarm about the integrity of external code. Users warn each other to consider uninstalling atop due to these risks and cite past incidences as reasons for caution. The debate showcases a heightened awareness surrounding software security and the responsibilities of developers regarding system integrity, especially in environments where critical infrastructure is involved.
0 Answers