30
Rust Foundation Security Initiative Report
(foundation.rust-lang.org)
Welcome to the Rust community! This is a place to discuss about the Rust programming language.
Credits
Hello there. Now I feel uncomfortable. Who am I to talk in the presence of experts.
Good point.
Hmm. When I read "Given the existence of macros", I didn't really think of compiler plugins. If that's what was meant, then I apologize for what looks now like an ELI5 comment.
Given that
crater
not only builds crates, but also runs tests, one would hope that such things wouldn't sneak to painter unnoticed!Apology appreciated, but unnecessary.
I don't want to derail a useful tool. It's worth going a bit beyond "hope" as a strategy, however, and thinking about if (how) this might be exploited.
I doubt anyone will be mining crypto in your sandbox. But perhaps you should think about detection; might it be possible to mask a malicious crate with a second that attempts to detect sandboxed compilation, for instance?
In any case, I think this still looks exceedingly interesting in the typical case, which is of detecting the impact of bugs from non-malicious actors.
Given the widespread existence of wasm sandboxing, rustc itself might want to think about alternative strategies for running compiler plugins. I suspect there'd be a performance hit with such an approach, but wasm tooling is getting really good; perhaps it is minor.