wg
watt
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
wg
-
Compiling version information into Rust binary
Check cargo-auditable or this thread on the same topic.
-
Rustaceans at the Border [Linux Kernel]
For other repro curious readers, this seems like a good entry point to follow reproducibility efforts: https://github.com/rust-secure-code/wg/issues/28
-
NPM malware and what it could imply for Cargo
If this topic interests you generally, please check out the Rust Secure Code Working Group.
-
How can we make sure this doesn't happen with Crates.io?
The Rust Secure Code Working Group, of which I'm a member, is one. We maintain the RUSTSEC security advisory database at:
watt
-
Rust devs push back as Serde project ships precompiled binaries
The precompiled binary is not a sandboxed WASM binary. Despite the name "watt" it has nothing to do with https://github.com/dtolnay/watt . You can look at the actual code to see for yourself.
- Arbitrary code execution during compilation – rust
-
syn v2.0.0 released
* Related: watt is one approach to pre-compile proc-macro crates using WASM.
-
My first year with Rust: The good, the bad, the ugly
In addition to thiserror and anyhow, our resident superhuman Rust-improving Robot, dtolnay, also developed an experiment in distributing precompiled proc macros as WebAssembly named Watt and, though I never bothered to create a Zulip account so I don't know what was said, I'm told there has been discussion around the idea of implementing something in that vein.
-
Rust is coming to the Linux kernel
I think when we have Cranelift, Mold, and maybe Watt all working together then compile times will basically be a non-issue. It'll be a few years though.
- watt: Runtime for executing (Rust) procedural macros as WebAssembly
-
Security advisory: malicious crate rustdecimal | Rust Blog
Check out https://github.com/dtolnay/watt - it's a really interesting solution to the problem!
-
Backdooring Rust crates for fun and profit
I really like the idea of Watt: https://github.com/dtolnay/watt Run macros in a wasm sandbox so they can't touch anything you don't explicitly allow.
-
NPM malware and what it could imply for Cargo
I really wish there was more interest in getting something like Watt upstreamed.
- Things I hate about Rust, redux
What are some alternatives?
namespacing-rfc - RFC for Packages as Optional Namespaces
godot-wasm-engine
kerla - A new operating system kernel with Linux binary compatibility written in Rust.
cargo2nix - Granular builds of Rust projects for Nix
rustsec - RustSec API & Tooling
cap-std - Capability-oriented version of the Rust standard library
nodo - Pre-emptively created repository so the design can be discussed on the issue tracker before commits are made (repo name may change)
kani - Kani Rust Verifier
ua-parser-js - UAParser.js - Free & open-source JavaScript library to detect user's Browser, Engine, OS, CPU, and Device type/model. Runs either in browser (client-side) or node.js (server-side).
cargo-deny - ❌ Cargo plugin for linting your dependencies 🦀
n - Node version management
awesome-wasm-runtimes - A list of webassemby runtimes