Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Crate Trustworthiness #6

Open
tarcieri opened this Issue Oct 16, 2018 · 2 comments

Comments

Projects
None yet
3 participants
@tarcieri
Copy link
Collaborator

tarcieri commented Oct 16, 2018

I think the issue of "which crates can we trust", where trust is some sort of crate reputation system, came up a lot in the discussions I participated in so far in the forming of this WG.

Here's a relevant incident which just occurred:

https://internals.rust-lang.org/t/crates-io-incident-2018-10-15/8568

Sorry for such a vague and open-ended topic, but perhaps we can break it down into a few more tangible issues.

@burdges

This comment has been minimized.

Copy link

burdges commented Dec 5, 2018

I'd expect crates.io to becoming an attack vector eventually, ala npm. I've two questions:

Would name spaces alleviate this attack vector? It's tricky. Imagine I do not release burdges/foolib to right9ctrl, but instead add a deprecation warning right9ctrl/foolib. If this deprecation warning lives in a readme.md then downstream crates shall migrate extremely slowly. If otoh this deprecation warning pops up in cargo runs, then migration should happen faster, like slightly below the rate for downstream version upgrades, which sounds well below the rate for npm.

Are micro-repos a security threat that contributes to npm's problems? We should not pull every stupid convenience toy into std, but if more related micro-crates can be aggregated into larger higher value crates, then would the long term maintenance costs be paid? I suspect so.

@Shnatsel

This comment has been minimized.

Copy link

Shnatsel commented Jan 6, 2019

Relevant discussion on crates.io bug tracker: rust-lang/crates.io#75

https://github.com/dpc/crev which may solve it for companies with a security department reviewing incoming code

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.