Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> But replacing small isolated components is not a very interesting option.

I seriously disagree. Again, I mentioned things like JSON parsing which deal with untrusted data but also are too performance sensitive to move OOP. Chromium's own security guidelines explicitly states that you should never mix memory unsafe code with inprocess code with untrusted input.

I strongly believe you'd get significant returns by incrementally replacing components like that with Rust.

> Every single decision on what language to use for a component in becomes a hard to reverse

This is purely an organizational issue in my opinion. If the decision were made to follow the guidelines their security team has laid out, there is no question or slow-down. The guidelines are very competent and clear; memory unsafe, untrusted input, in-process - pick one at most.



Do you have examples of exploits in the non-sandboxed JSON parser? That code doesn't appear to have any security/memory safety related fixes in the last 2 years: https://chromium.googlesource.com/chromium/src.git/+log/refs...

It's not clear what the return would be from rewriting that code in rust.


JSON is just a straightforward example because it's easy to understand how it falls into Chromium's threat model. Feel free to replace it with font parsing, audio/video codecs, etc, and you'll find thousands of relevant vulns.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: