Running public scripts is great, but what about running deployment scripts from a private GitHub repo or setup scripts from an internal server?
Based on this, I've opened a new feature request to add authentication support to vet, with a roadmap that includes .netrc support, a VET_TOKEN environment variable, and a future goal of integrating with secret managers like HashiCorp Vault by reading tokens from stdin.
If you're interested in that direction, I'd love to get your thoughts on the feature request over on GitHub:
https://github.com/vet-run/vet/issues/4
Thanks again for all the great feedback!
Its role in vet isn't to find malware, but to act as an automated code quality check. A script full of shellcheck warnings is a red flag, which helps inform the user's final decision to trust it or not. It's one of several signals that vet provides.
Thanks for the important clarification!