We do run .deb/.rpm files from random websites though.
In general with Linux sites with deb/rpm/etc files would usually include hashes for the genuine versions etc. Not to say the actual author of these could be malicious.
And you mentioned flatpak too. Appimage is quite popular too, and afaik that doesn’t have any built-in sandboxing at all.
Even with sandboxing, they generally need access to save files/load files etc from the host environment. Where are these connections defined? Could a malicious actor for example grant their malicious appimage/flatpak more access? Genuine questions, I’ve never looked into how these work.



I would say, now it’s learning that actually sticking your head in the sand is only ever a delaying tactic. But, if it DID learn that, it’d mean it has surpassed us already.