Is it a design goal of Rust that you will be able to run untrusted
code in-process safely?

In other words, by whitelisting the set of available APIs and
prohibiting unsafe blocks, would you be able to (eventually, once Rust
is stable and hardened) run untrusted code in the same address space
without it intentionally or unintentionally escaping its sandbox?

(Sorry if this a FAQ, I couldn't find any info about it).

Thanks,
Josh
_______________________________________________
Rust-dev mailing list
Rust-dev@mozilla.org
https://mail.mozilla.org/listinfo/rust-dev

Reply via email to