The answer: It is.
It's always a risk in introducing additional sources for packages, irregardless of what distro/OS you're using. The use of GPG keys, in theory, helps to mitigate the risks, since in theory, someone would have to:
- get access to the server where the binaries are being served from
- get access to the private GPG key that was used to sign the binaries
- package new versions of compromised binaries, sign them, and then put on server
In this scenario, someone would have to get through multiple layers to do something nefarious. As is always the case with security. It's all about layers! In order for a community to thrive and stand on the shoulders of others, you have to be willing to forgo isolation, and put your trust in others.
And keep in mind, the servers that serve files have been compromised before to varying degrees, but it's typically caught right away and can be addressed in short order.
Previous Attacks
Tips
- Always scrutinize URLs and make sure they are legit
- Don't add repos unless you absolutely need a package from them
- Periodically vet your sources.list
- Periodically vet the GPG keys used by sites to sign packages
- Be diligent about staying up to date on packages