project-safe-transmute
Project group working on the "safe transmute" feature (by rust-lang)
advisory-db
Security advisory database for Rust crates published through crates.io (by rustsec)
project-safe-transmute | advisory-db | |
---|---|---|
7 | 37 | |
78 | 866 | |
- | 3.1% | |
0.0 | 9.3 | |
3 months ago | 9 days ago | |
Apache License 2.0 | GNU General Public License v3.0 or later |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
project-safe-transmute
Posts with mentions or reviews of project-safe-transmute.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-06-18.
-
Hey Rustaceans! Got a question? Ask here (25/2023)!
Project "safe transmute"
-
[Media] This is kinda cool
In this case a simple From implementation or anything like that won't be different, even performance wise. For more complex cases there's project-safe-transmute, but that will still require you to annotate your structs in such a way that their layouts will be guaranteed to be compatible, which you're not currently doing.
-
Turning a slice of structs into a slice of floats without copying?
You might also be interested in the project safe transmute, which might bring safe transmutes like these to stdlib in the future.
-
Purely Functional Data Structures in Rust
That's probably a job for the safe transmute project
-
Rudra: Rust Memory Safety & Undefined Behavior Detection
One of the biggest notable examples is unsafe transmutes that could be safe. In fact there's a safe transmute working group trying to cover these cases. Just to give an example, if you have a #[repr(transparent)] newtype, it could be possible to safely transmute from a reference of an inner type to the type it wraps (for e.g. 1-tuple or 1-field structs), but doing that now presently requires unsafe.
- Deserializing Binary Data Files in Rust
-
totally-safe-transmute
Jokes aside, there is actually a work on going for making a subset of transmutes safe: https://github.com/rust-lang/project-safe-transmute
advisory-db
Posts with mentions or reviews of advisory-db.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2024-03-26.
- Serde-YAML for Rust has been archived
- When Zig is safer and faster than Rust
-
Advisory: Miscompilation in cortex-m-rt 0.7.1 and 0.7.2
You might also want to add this to https://github.com/rustsec/advisory-db so that cargo audit and Dependabot surface it.
-
"This type of secure-by-default functionality is why we love Go"
The behavior of not extracting outside the specified directory has been the default since forever in Rust's tar. And then it had two RUSTSEC advisories for not handling this correctly in certain corner cases. The latest one in 2021.
-
greater supply chain attack risk due to large dependency trees?
cargo-audit only checks for known issues reported to a vulnerability database.
- capnproto-rust: out-of-bound memory access bug
-
`cargo audit` can now scan compiled binaries
However, I keep getting this error when running cargo audit bin ~/.cargo/bin/*, even if I replace * with a specific binary: Fetching advisory database from `https://github.com/RustSec/advisory-db.git` Loaded 467 security advisories (from C:\Users\jonah\.cargo\advisory-db) Updating crates.io index error: I/O operation failed: The system cannot find the path specified. (os error 3) I'm on Windows 10.
-
MIA Github Assignee on very minor PR
I usually open an issue asking if the crate is still maintained. If there isn't a response for a decent amount of time (like multiple months) and the crate is somewhat popular then it could be worth opening an unmaintained advisory in the advisory-db
-
RustSec Advisory Database Visualization
Here is the visualization of RustSec Advisory Database. I hope it will be helpful. If you need any more charts, feel free to comment.
-
Github Dependency graph adds vulnerability alerting support for Rust
FWIW the RustSec database is still not synced into the Github databse on a regular basis, even though they did an initial import of it. So the cargo audit github action is still relevant.
What are some alternatives?
When comparing project-safe-transmute and advisory-db you can also consider the following projects:
Rudra - Rust Memory Safety & Undefined Behavior Detection
cargo-deny - ❌ Cargo plugin for linting your dependencies 🦀
rust - Empowering everyone to build reliable and efficient software.
chrono - Date and time library for Rust
totally-safe-transmute
vulndb - [mirror] The Go Vulnerability Database
Rudra-PoC - Trophy case for Rudra bugs.
rustsec - RustSec API & Tooling
kaitai_struct_rust_runtime - Kaitai Struct: runtime for Rust
Kaitai Struct - Kaitai Struct: declarative language to generate binary data parsers in C++ / C# / Go / Java / JavaScript / Lua / Nim / Perl / PHP / Python / Ruby
dwflist - The DWF IDs
project-safe-transmute vs Rudra
advisory-db vs cargo-deny
project-safe-transmute vs rust
advisory-db vs chrono
project-safe-transmute vs totally-safe-transmute
advisory-db vs vulndb
project-safe-transmute vs Rudra-PoC
advisory-db vs rustsec
project-safe-transmute vs kaitai_struct_rust_runtime
advisory-db vs Rudra
project-safe-transmute vs Kaitai Struct
advisory-db vs dwflist