You're a production sysadmin now. That comes with certain responsibilities.
In short:
Assorted tips:
SELECT things, you, want FROM x;
is generally better than SELECT * FROM x;
when considering the user's privacy.Because you now have access to production systems, you may be a target for spear phishing. A bad actor may target you directly in a social engineering attack in an attempt to get you to leverage your access to mistakenly compromise the system. For example, someone may impersonate another admin and ask you to add an SSH key to a server. You need to be aware of this risk.
If you receive a request to leverage your access for any reason, double check the veracity of the request. Is the person on IRC identified with NickServ for the correct account? Is the email they sent DKIM signed and verified from the right sender? If in doubt, ask for a secondary form of authentication, such as a PGP challenge.
This also applies to normal requests from users — don't let someone impersonate another user in an attempt to gain access to or manipulate their account. Be especially careful with requests from users with 2FA enabled.
commit aa91af4fa09eb84be3388f5d8ff4c5bb3059ae5e Author: Runxi Yu <me@runxiyu.org> Date: 2025-03-15T15:39:35+08:00 lists.sr.ht: HTML emails are rejected by most lists, not always Signed-off-by: Runxi Yu <me@runxiyu.org> References: https://git.sr.ht/~sircmpwn/lists.sr.ht/commit/d2470931a39c6816db9427abfd03b3b3093987e3