Hacker News new | past | comments | ask | show | jobs | submit login

>> wouldn't it be easier for the same attacker to do the same thing by exploiting a vulnerability in a different crate, and include that other crate as a dependency?

Possibly, which is why the example is a bit contrived. In most cases, the toolchains will likely be more trusted and be on approved lists whereas binaries created by third-party crates are not.

For more secure environments, explicitness is valued and automatic installation of anything is frowned upon because it can introduce unvetted changes which could include vulnerabilities.

It depends on what work is being done and how much toolchains and ecosystem can be trusted.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: