[rust-dev] sandboxing Rust?
corey at octayn.net
Sat Jan 18 19:21:36 PST 2014
Rust's safety model is not intended to prevent untrusted code from
doing evil things.
On Sat, Jan 18, 2014 at 10:18 PM, Josh Haberman <jhaberman at gmail.com> wrote:
> Is it a design goal of Rust that you will be able to run untrusted
> code in-process safely?
> In other words, by whitelisting the set of available APIs and
> prohibiting unsafe blocks, would you be able to (eventually, once Rust
> is stable and hardened) run untrusted code in the same address space
> without it intentionally or unintentionally escaping its sandbox?
> (Sorry if this a FAQ, I couldn't find any info about it).
> Rust-dev mailing list
> Rust-dev at mozilla.org
More information about the Rust-dev