this post was submitted on 06 Sep 2023
143 points (94.4% liked)

Programmer Humor

32588 readers
1191 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 11 points 1 year ago* (last edited 1 year ago) (1 children)

[This comment has been deleted by an automated system]

[–] [email protected] 1 points 1 year ago (1 children)

I don't think this is a problem with proc macros or package managers. This is just a regular supply chain attack, no?

The way I understand it, sandboxing would be detrimental to code performance. Imagine coding a messaging system with a serve struct, only for serde code to be much slower due to sandboxing. For release version it could be suggested to disable sandboxingy but then we would have gained practically nothing.

In security terms, being prepared for incidents is most often better than trying to prevent them. I think this applies here too, and cargo helps here. It can automatically update your packages, which can be used to patch attacks like this out.

If you think I'm wrong, please don't hesitate to tell me!

[–] [email protected] 3 points 1 year ago* (last edited 1 year ago)

[This comment has been deleted by an automated system]