rustig VS x_do.cr

Compare rustig vs x_do.cr and see what are their differences.

rustig

A tool to detect code paths leading to Rust's panic handler (by Technolution)

x_do.cr

Crystal bindings for libxdo (xdotool) (by woodruffw)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
rustig x_do.cr
9 1
215 18
0.0% -
0.0 4.8
over 2 years ago 10 months ago
Rust Crystal
Apache License 2.0 MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

rustig

Posts with mentions or reviews of rustig. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-03-25.
  • Is there something like "super-safe" rust?
    8 projects | /r/rust | 25 Mar 2023
    There is also rustig though it seems quite dead.
  • Is Rust really safe? How to identify functions that can potentially cause panic
    6 projects | /r/rust | 12 Mar 2023
    There’s the rustig tool (https://github.com/Technolution/rustig) that looks for code paths leading to the panic handler. Not sure if it still works though.
  • My thoughts on Rust and C++
    7 projects | /r/rust | 20 Sep 2022
    That's fair. I think I may just be a bit sore that Rustig was allowed to bit-rot and findpanics hasn't seen a commit since 2020.
  • What improvements would you like to see in Rust or what design choices do you wish were reconsidered?
    5 projects | /r/rust | 1 Sep 2022
  • Things I hate about Rust, redux
    5 projects | /r/programming | 10 Mar 2022
    There's Rustig which does it for panics, though it seems unmaintained and uses inspection of the final binary rather than source code/AST inspection.
    7 projects | /r/rust | 10 Mar 2022
    You might be interested in this: https://github.com/Technolution/rustig
  • Three Things Go Needs More Than Generics
    7 projects | news.ycombinator.com | 3 Oct 2021
    > Doesnt Rust have implicit panics on indexing out of bounds?

    It does yes. A fair number of other constructs can panic as well.

    > I wonder if any codebases lint those away.

    Clippy has a lint for indexing so probably.

    For the general case, it's almost impossible unless you're working on very low-level software (embedded, probably kernel-rust eventually) e.g. `std` assumes allocations can't fail, so any allocation will show up as a panic path.

    https://github.com/Technolution/rustig can actually uncover panic paths, but because of the above the results are quite noisy, and while it's possible to uncover bugs thanks to rustig it requires pretty ridiculous amounts of filtering.

  • Linus Torvalds on Rust support in kernel
    6 projects | news.ycombinator.com | 16 Apr 2021
    This comment is strongly confused.

    > [1] https://github.com/Technolution/rustig

    That's a binary analysis tool. It is only approximate, and does not claim to be an accurate analysis like unsafe-checking and typechecking are:

    https://github.com/Technolution/rustig#limitations

    > All paths leading to panic! from one of those functions (whether actually used or not) will be reported.

    It also only works on x86_64 binaries.

    Panics are an ugly leftover from the bad old days before Rust had nice monad-like syntax for Result error-handling (the "?" syntax). It's time for panic to sunset.

x_do.cr

Posts with mentions or reviews of x_do.cr. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-03-10.
  • Things I hate about Rust, redux
    5 projects | /r/programming | 10 Mar 2022
    Here's an example from some of my own (old) code of using a macro to generate a bunch of boilerplate methods. It's a very simple example, but it demonstrates how readable the macro language is.

What are some alternatives?

When comparing rustig and x_do.cr you can also consider the following projects:

Rust-for-Linux - Adding support for the Rust language to the Linux kernel.

pledge.cr - Adds pledge(2) to crystal.

go101 - An up-to-date (unofficial) knowledge base for Go programming self learning

crystal-hunspell - Crystal bindings for Hunspell.

bastion - Highly-available Distributed Fault-tolerant Runtime

asound-cr - ALSA/libasound bindings for sound programming in Crystal language.

pwninit - pwninit - automate starting binary exploit challenges

crass - libsass bindings for Crystal-Lang

kani - Kani Rust Verifier

x11-cr - X11 bindings for Crystal language.

gdbstub - An ergonomic, featureful, and easy-to-integrate implementation of the GDB Remote Serial Protocol in Rust (with no-compromises #![no_std] support)

cairo-cr - Cairo bindings for Crystal language.