Software developers and malware often abuses the built-in functionality of the shell to execute data piped into it. Software, malicious or benign, may host installation scripts on a web server and install itself using curl to execute a script hosted remotely with a command like this:
curl hxxp://foo[.]net/installer.sh | sh