Hacker News new | past | comments | ask | show | jobs | submit login

I don't really understand why this doesn't cover memory safety.



Yes, after reading a draft[1] of this document, I suggested to them that they seemed to be insufficiently emphasizing remote execution vulnerabilities (due to invalid memory access). I also pointed out that they neglected to mention Rust and the Clang/LLVM sanitizers. (And SaferCPlusPlus[2] too.) They acknowledged my comments, but it doesn't seem to have had much effect on the document.

[1] https://news.ycombinator.com/item?id=12643463

[2] shamelss plug: https://github.com/duneroadrunner/SaferCPlusPlus


Seriously. Just switching to memory safe languages would be the single biggest reduction in software vulnerabilities you could achieve with one decision.


Overflow, memory randomization, and other related topics are sprinkled around the document, but yes, there's not a specific section.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: