-
-
Notifications
You must be signed in to change notification settings - Fork 14.5k
Closed as not planned
Labels
C-feature-requestCategory: A feature request, i.e: not implemented / a PR.Category: A feature request, i.e: not implemented / a PR.
Description
It would be nice if rust had a pretty good answer to "why is this date formatting library reading from disk and talking to the network?"
Constantly monitoring significant numbers of rust crates across the ecosystem doesn't scale well. Is there an effective way to get Pretty Good supply chain security in rust packages? I am interested to find out whether the rust community has a method of solving 98% of this problem, not 100%.
Some example approaches here would include:
- having crates.io make it really obvious that safe code within a dependency talks to the network or disk.
- having dependency-level sandboxing (perhaps declare in Cargo.toml that a package may use the network/write to disk etc)
- separating dependencies which use safe only from dependencies which include unsafe
- requiring packages which are new (less than two years old), fewer than 100k users, and which use unsafe to be marked as "experimental"
Additional potential approaches are very welcome
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
C-feature-requestCategory: A feature request, i.e: not implemented / a PR.Category: A feature request, i.e: not implemented / a PR.