On Mon, Jul 2, 2018, at 9:03 AM, Eric Rescorla wrote:
> On Sat, Jun 30, 2018 at 9:35 AM, Lars Bergstrom <larsb...@mozilla.com>
> wrote:
> 
> > On Fri, Jun 29, 2018 at 8:33 AM, Tom Ritter <t...@mozilla.com> wrote:
> >
> > >
> > > I know that enumerating badness is never a comprehensive solution; but
> > > maybe there could be a wiki page we could point people to for things that
> > > indicate something is doing something scary in Rust?  This might let us
> > > crowd-source these reviews in a safer manner. For example, what would I
> > > look for in a crate to see if it was:
> > >  - Adjusting memory permissions
> > >  - Reading/writing to disk
> > >  - Performing unsafe C/C++ pointer stuff
> > >  - Performing network connections of any type
> > >  - Calling out to syscalls or other kernel functions (especially
> > win32k.sys
> > > functions on Windows)
> > >  - (whatever else you can think of...)
> > > <https://lists.mozilla.org/listinfo/dev-platform>
> > >
> >
> > ​Building on that, is there a list of crates that should *never* be
> > included in Firefox that you could scan for? Such as, anything that is not
> > nss (openssl bindings) or necko (use of a different network stack that
> > might not respect proxies, threading concerns, etc.)​?
> 
> Is this a crate-specific issue? Suppose that someone decided to land
> a new C++ networking stack, that would presumably also be bad but
> should be caught in code review, no?

The point is that adding a new crate dependency is too easy accidentally, and 
it is very possible for reviewers to overlook that. So it may make sense to 
introduce a blacklist-ish thing to avoid that to happen.

- Xidorn
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to