Skip to content

Instantly share code, notes, and snippets.

@SaraVieira
Created December 5, 2022 18:16
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save SaraVieira/314934669ec1b460fb065379e1867538 to your computer and use it in GitHub Desktop.
Save SaraVieira/314934669ec1b460fb065379e1867538 to your computer and use it in GitHub Desktop.

This crate will not introduce a serious security vulnerability to production

software exposed to untrusted input.

Auditors are not required to perform a full logic review of the entire crate. Rather, they must review enough to fully reason about the behavior of all unsafe blocks and usage of powerful imports. For any reasonable usage of the crate in real-world software, an attacker must not be able to manipulate the runtime behavior of these sections in an exploitable or surprising way.

Ideally, all unsafe code is fully sound, and ambient capabilities (e.g. filesystem access) are hardened against manipulation and consistent with the advertised behavior of the crate. However, some discretion is permitted. In such cases, the nature of the discretion should be recorded in the notes field of the audit record.

For crates which generate deployed code (e.g. build dependencies or procedural macros), reasonable usage of the crate should output code which meets the above criteria.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment