Rust's safety model is not intended to prevent untrusted code from
doing evil things.

On Sat, Jan 18, 2014 at 10:18 PM, Josh Haberman <[email protected]> wrote:
> Is it a design goal of Rust that you will be able to run untrusted
> code in-process safely?
>
> In other words, by whitelisting the set of available APIs and
> prohibiting unsafe blocks, would you be able to (eventually, once Rust
> is stable and hardened) run untrusted code in the same address space
> without it intentionally or unintentionally escaping its sandbox?
>
> (Sorry if this a FAQ, I couldn't find any info about it).
>
> Thanks,
> Josh
> _______________________________________________
> Rust-dev mailing list
> [email protected]
> https://mail.mozilla.org/listinfo/rust-dev
_______________________________________________
Rust-dev mailing list
[email protected]
https://mail.mozilla.org/listinfo/rust-dev

Reply via email to