The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning. Learn more →
Rust memory-safety Projects
-
untrusted
Safe, fast, zero-panic, zero-crashing, zero-allocation parsing of untrusted inputs in Rust. (by briansmith)
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
A recent practical example of the former: the fish shell re-wrote incrementally from C++ to Rust, and is almost finished https://github.com/fish-shell/fish-shell/discussions/10123
An example of the latter: c2rust, which is a work in progress but is very impressive https://github.com/immunant/c2rust
It currently translates into unsafe Rust, but the strategy is to separate the "compile C to unsafe Rust" steps and the "compile unsafe Rust to safe Rust" steps. As I see it, as it makes the overall task simpler, allows for more user freedom, and makes the latter potentially useful even for non-transpiled code. https://immunant.com/blog/2023/03/lifting/
Rust memory-safety related posts
- Still no love for JPEG XL: Browser maker love-in snubs next-gen image format
- Don't carelessly rely on fixed-size unsigned integers overflow
- How much does Rust's bounds checking cost?
- Question about safety when accessing an array out of bounds
- Some Mistakes Rust Doesn't Catch
- Wuffs PNG decoder faster than rust
-
A note from our sponsor - WorkOS
workos.com | 23 Apr 2024
Index
Sponsored