Rust's safety model is not intended to prevent untrusted code from doing evil things.
On Sat, Jan 18, 2014 at 10:18 PM, Josh Haberman <[email protected]> wrote: > Is it a design goal of Rust that you will be able to run untrusted > code in-process safely? > > In other words, by whitelisting the set of available APIs and > prohibiting unsafe blocks, would you be able to (eventually, once Rust > is stable and hardened) run untrusted code in the same address space > without it intentionally or unintentionally escaping its sandbox? > > (Sorry if this a FAQ, I couldn't find any info about it). > > Thanks, > Josh > _______________________________________________ > Rust-dev mailing list > [email protected] > https://mail.mozilla.org/listinfo/rust-dev _______________________________________________ Rust-dev mailing list [email protected] https://mail.mozilla.org/listinfo/rust-dev
