Effects, Capabilities, and Log4Shell

This page summarizes the projects mentioned and recommended in the original post on /r/ProgrammingLanguages

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
  • src

    Read-only git conversion of OpenBSD's official CVS src repository. Pull requests not accepted - send diffs to the tech@ mailing list.

  • The OP talks a lot about solving this problem through either capabilities or effect type systems, but the approach to this problem that I think is most interesting is OpenBSD's pledge() and unveil(). The way those functions work is that, when they're called at runtime, they pre-commit the program to only thereafter have access to certain system calls or filesystem locations. Any system calls that violate pledges or attempt to access veiled filesystem paths will result in system call failures (e.g. in C, syscalls would return -1 or whatever the failure result is for each function's API). This is enforced at the operating system level on a per-process basis. Effectively, it's like each process defines its own sandboxing boundaries and the OS enforces them. As an example, OpenBSD's sleep implementation first pledges it won't use anything besides I/O syscalls, then does its business. If there were some bug in the code that allowed an attacker to execute arbitrary instructions (e.g. a buffer overflow), it still couldn't do anything dangerous like modifying the filesystem or setting the process's userid to root.

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • OpenBSD 7.3 を 7.4 へ アップグレード

    3 projects | dev.to | 6 May 2024
  • Ohmyksh: A Framework for OpenBSD's Ksh

    1 project | news.ycombinator.com | 6 Apr 2024
  • Unix and Beyond: An Interview with Ken Thompson (2003)

    1 project | news.ycombinator.com | 12 Mar 2024
  • OpenBSD Upgrade 7.3 to 7.4

    3 projects | dev.to | 16 Feb 2024
  • Cosmopolitan – build-once run-anywhere C library

    1 project | news.ycombinator.com | 16 Feb 2024