• anti-idpol action@programming.dev
    link
    fedilink
    arrow-up
    5
    arrow-down
    7
    ·
    1 month ago

    wake me up when Rust fixes its’ supply chain attacks susceptibility (solid stdlib and rejecting external crates, including transitive deps

    • Ephera@lemmy.ml
      link
      fedilink
      arrow-up
      3
      ·
      1 month ago

      Probably not going to happen. I will say that it’s less bad than you might think, because there is more-or-less an unofficial extended stdlib, i.e. high-quality, widely used libraries which are maintained by people in the Rust team.

      But yeah, I’m involved in a somewhat larger project and we’ve cracked 1000 transitive dependencies a few weeks ago, and I can tell you for free that I don’t personally know the maintainers of all of those.
      If this was more of a security-critical project, there’s probably a dozen or so direct dependencies that we would have implemented ourselves instead.

    • Rogue@feddit.uk
      link
      fedilink
      arrow-up
      5
      arrow-down
      3
      ·
      edit-2
      1 month ago

      This has been one of my biggest frustrations while learning Rust. I’m coming from .NET which has an incredible wealth of official System and Microsoft libraries all of which are robust and well documented.

      Rust on the other hand has the bare minimum std library, with everything else implemented by the community. There isn’t even a std async library. It’s insane.

      Even the popular community libraries are severely lacking in documentation or inexplicably unmaintained.

      Rust has a ton of potential but it desperately needs some broad funding to align the fundamentals to a decent standard.