Is it a design goal of Rust that you will be able to run untrusted code in-process safely?
In other words, by whitelisting the set of available APIs and prohibiting unsafe blocks, would you be able to (eventually, once Rust is stable and hardened) run untrusted code in the same address space without it intentionally or unintentionally escaping its sandbox? (Sorry if this a FAQ, I couldn't find any info about it). Thanks, Josh _______________________________________________ Rust-dev mailing list Rust-dev@mozilla.org https://mail.mozilla.org/listinfo/rust-dev