Skip to content

Pretty Good Supply Chain Security #100597

@rustrust

Description

@rustrust

It would be nice if rust had a pretty good answer to "why is this date formatting library reading from disk and talking to the network?"

Constantly monitoring significant numbers of rust crates across the ecosystem doesn't scale well. Is there an effective way to get Pretty Good supply chain security in rust packages? I am interested to find out whether the rust community has a method of solving 98% of this problem, not 100%.

Some example approaches here would include:

  • having crates.io make it really obvious that safe code within a dependency talks to the network or disk.
  • having dependency-level sandboxing (perhaps declare in Cargo.toml that a package may use the network/write to disk etc)
  • separating dependencies which use safe only from dependencies which include unsafe
  • requiring packages which are new (less than two years old), fewer than 100k users, and which use unsafe to be marked as "experimental"

Additional potential approaches are very welcome

Metadata

Metadata

Assignees

No one assigned

    Labels

    C-feature-requestCategory: A feature request, i.e: not implemented / a PR.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions