> Ghostbox is software for launching short-lived development machines using third-party infrastructure such as GitHub Actions, tunnels, shells, agents, and related developer tools.
So this will go down, just like GitHub Actions since it abuses the subsidised free tier of GitHub Actions to run a service like this and it is likely against the GitHub TOS.
First, I am fairly certain this violates Github's ToS. Second, it effectively amounts to a denial of service. Third, are people seriously using the .charity TLD to host something this frivolos? Have people got no sense of propriety anymore?
If you choose a specific company's free tier, you can rely on reputation and switch if they misbehave (e.g. they exfiltrate your secrets, log all your activities, build a profile on your workload behavior, etc). But if you don't know where your workload being deployed, the operator has less incentive to treat your compute with respect.
Means this is really only useful for nearly-public workloads, where tampering is not a critical failure mode.
If blocking doesn't work, there will be phone verification. If that doesn't work you're gonna need to get orbed. If that doesn't work, you're gonna need to drink the verification cans. Or they will just kill the free tiers. There is no free lunch.
Basically any golang/any language cli application preferably-static can be dropped and ran in ghostbox plus xterm in browser (and additionally cloudflare tunnels) or perhaps directly to give a web link.
Anyone can then click on that web link to then try out the cli application. Think jujutsu and others too and they can do this upto 90 minutes.
Feel free to pick up on this idea as more importantly than not, I would personally love to see an idea like this, even something with asciinema to finally show how an app feels and looks.
Can you please tell me more about what is the structure behind Ghostbox and on what service does it run upon? Hetzner/OVH or something else? I would be interested to know more about the infrastructural decisions behind it and does it run on firecrackers, quite so many questions!
This is a really cool project, thanks for making this and have a nice day!
$ curl -fsSL https://www.ghost.charity/install.sh | bash Checking for Ghostbox updates... curl: (22) The requested URL returned error: 404 Could not fetch ghost-linux-x64.tar.gz from https://github.com/DO-SAY-GO/ghostbox-releases/releases/late...
Some years ago I toyed with the idea of running a minecraft server inside github actions, I used tailscale to create a public endpoint and saved the world in an artifact that was re-loaded on the next run. It worked really well, but the point was never to actually use it for real.
AI=generated article that asks you to download and run some random binary. Github account is just more AI slop. Everything to me just screams that it's a malware. Or this is normal here?
It sounds like Github Actions is the first choice, if it's unavailable (or if Github blocks GhostBox in the future), are each of the alternatives viable as a more or less drop-in replacement? Or would there be loss of functionality?
Those are the questions I had when reading through the site so I think some basic technical docs would go a long way to help people understand the project and decide to give it a try. I like the cute/whimsical branding but I'll admit to doing a little internal eye-roll when I clicked that link expecting technical specifics and instead read:
> GitHub Actions is only the first place ghosts come from. There are strange little pockets of temporary compute all over the internet. Ghostbox makes them feel like one small machine.
It's a neat idea though, and I've definitely had moments where I wished I could just spin up a free, temporary VM/container to do something but didn't feel like researching the current free-tier landscape and filling out a sign-up form and stuff.We need more of these. There are too many sandboxes that charge insane prices.
Curious what this runs on though and it would be great if this was completely open source.
Great work!
Also somebody should Ghidra the project, see if they can find malware. I'm not saying anyone has to, just a thought
The broader concept seems to be "ephemeral environments", which is related to sandboxing, which is in turn is related to testing/debugging...
Related:
https://github.com/topics/ephemeral-environments
https://blog.invisiblethings.org/papers/2015/state_harmful.p...