-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Audit Trillium #80
Comments
I note that the "Safety" documentation for
As far as I saw, Trillium does not check that the file descriptor numbers refer to valid, open file descriptors before calling |
That's unsound, yes. But It's quite strange to read a file descriptor number of all the things from an environment variable; it would be quite difficult to specify what file you wish to operate on. This suggests that it may be a testing facility or something of the sort. In any case, this does warrant a closer look. |
I think I found the explanation:
|
Trillium "is a composable toolkit for building web applications". It is not popular (727 downloads/month), but it has very little
unsafe
in its own code: just two calls tostd::net::TcpListener::from_raw_fd
, with the file descriptor number taken from an environment variable.Edited to add: Trillium is mostly under
#[forbid(unsafe_code)]
.The text was updated successfully, but these errors were encountered: