[rust-dev] sandboxing Rust?

Josh Haberman jhaberman at gmail.com
Sat Jan 18 19:18:17 PST 2014

Is it a design goal of Rust that you will be able to run untrusted
code in-process safely?

In other words, by whitelisting the set of available APIs and
prohibiting unsafe blocks, would you be able to (eventually, once Rust
is stable and hardened) run untrusted code in the same address space
without it intentionally or unintentionally escaping its sandbox?

(Sorry if this a FAQ, I couldn't find any info about it).


More information about the Rust-dev mailing list