in reply to Enno T. Boland

@Gottox mastodon.social/@bagder/113638…


@LangerJan

curl.se/docs/security.html explains:

The flaws listed as "C mistakes" are vulnerabilities that we deem are likely to not have happened should we have used a memory-safe language rather than C. The C mistakes are divided into the following areas: OVERFLOW, OVERREAD, DOUBLE_FREE, USE_AFTER_FREE, NULL_MISTAKE and UNINIT.


in reply to Julian Andres Klode πŸ³οΈβ€πŸŒˆ

@gullevek @maia I mean Rust is great, but also a memory-safe language would be enough for curl, it does not have to be a high-performance memory safe language?

If you get rid of lifetimes and pass everything by reference life becomes _a lot_ simpler.

in reply to Julian Andres Klode πŸ³οΈβ€πŸŒˆ

@juliank @gullevek @maia first, I don't think the premise that speed is unimportant holds. Then, I don't think there is any other language than rust that would be close to viable (and even that does not even support half the platforms curl runs on). Also, don't forget footprint.

But sure. It is just code.

in reply to daniel:// stenberg://

then we would have 40% vulnerabilities in $Other_Language.
you need an expert in that language + the same person being security aware (in full) to drastically reduce this number.And this person has to have fun writing code used y everyone while getting blamed by everyone when there is a small mistake or vulnerability. And these days, getting annoying Vulnerability reports created by KI by people who think they are good. I am grateful that Daniel uses his spare time to develop curl.
⇧