You might want to stop running atop
Reason for the warning
- The original blog post simply says to stop running and uninstall
atop, without giving technical details. - Many commenters infer this implies a serious security issue (e.g., exploitable bug or backdoor), not just high resource usage or misleading output.
- The explicit “uninstall” language is seen as pointing to a high‑impact risk rather than a mere quality gripe.
Debate over vague disclosure and trust
- One camp says they will immediately remove
atopbased on the author’s reputation and the low cost of dropping a non‑essential tool. - Another camp criticizes this as “vagueposting,” arguing that changing software in production without a stated reason is bad practice.
- There’s discussion of situations where someone may know specifics but be constrained by NDAs or ongoing incident response, and whether “trust me” is ever sufficient.
Potential security concerns in atop
atopcan run persistently as root on some distros; optionalnetatopadds a root daemon plus a kernel module that hooks netfilter and has reportedly caused kernel crashes.- The package installs root‑run hooks and scripts (e.g., power‑management hooks), which some see as a natural place to hide a backdoor.
- Code review in the thread highlights:
- Use of
system("gunzip -c %s > %s", ...)with user‑controlled input and/tmptempfiles, raising command‑injection and TOCTOU concerns (though it’s not SUID). - General “sketchy” C practices that might hide exploitable bugs.
- Use of
- An older bug, previously found in
atop, could crash the program and degrade system performance via obscure hardware‑timer interactions, reinforcing perceptions of fragility. - A later follow‑up post (linked in the thread) indicates a user‑to‑user privilege‑escalation pattern: one user can cause another user’s
atopto “blow up” in a way that could be abused.
Distribution impact and operational use
- Multiple users confirm
atopis usually not installed by default on major distros, but is widely available in repositories. - Some organizations deploy it fleet‑wide as a last‑resort forensic and historical resource monitor, so a critical issue could have large blast radius.
- Several people describe rapidly removing it via config management and package locks.
Alternatives and geopolitics
- Many note they already use
top,htop,btop, orglances;atop’s unique value is historical logging and replay. - There is side debate over maintainers’ geography (e.g., China/Russia vs. Western countries), government pressure, and whether that meaningfully changes trust assumptions for open‑source tools.