TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Fish in a Barrel Memory Safety Bounty Program

52 点作者 Titanous将近 5 年前

4 条评论

f00zz将近 5 年前
Sorry, but I'm not seeing how this will help. If I take e.g. libpng and rewrite it in Rust, then it's basically a new project. I don't understand how a patch replacing all existing code will be accepted upstream, or how the many projects using libpng will be convinced to use my new library.
评论 #23969598 未加载
评论 #23968844 未加载
评论 #23973999 未加载
kingkilr将近 5 年前
One of the folks behind the bounty here. Happy to answer questions.
评论 #23968037 未加载
评论 #23969177 未加载
hackcasual将近 5 年前
&gt; Q: What if the maintainers won&#x27;t accept the patch?<p>&gt; A: The Fish in a Barrel Memory Safety Bounty only rewards contributions that are merged upstream. We strongly encourage people interested in pursuing a bounty to work with, not against, open source maintainers and to behave respectfully.<p>It&#x27;s good to see this called out specifically, but I can&#x27;t help but think this is attaching a monetary incentive to badger a project to accept a patch that at the very least requires changes to the project build system
评论 #23967983 未加载
评论 #23967922 未加载
评论 #23967917 未加载
评论 #23968263 未加载
rurban将近 5 年前
Rewriting stuff in memory safe languages would be a worthwhile goal, but then they go on by providing bounties to write Linux Kernel drivers in Rust.<p>Rust is memory safe only in documentation but not in practise.[1] Rather provide bounties for real memory safe languages. Rust is also neither type safe[2] nor concurrency safe[3].<p>1: eg <a href="https:&#x2F;&#x2F;github.com&#x2F;rust-lang&#x2F;rust&#x2F;issues?q=is%3Aissue+is%3Aopen+stack+overflow" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;rust-lang&#x2F;rust&#x2F;issues?q=is%3Aissue+is%3Ao...</a> but this is just the surface. alloca is not only unsafe but also security critical. Rust stack allocates too much unchecked.<p>2. <a href="https:&#x2F;&#x2F;doc.rust-lang.org&#x2F;reference&#x2F;unsafe-blocks.html" rel="nofollow">https:&#x2F;&#x2F;doc.rust-lang.org&#x2F;reference&#x2F;unsafe-blocks.html</a><p>3. Races as eg with <a href="https:&#x2F;&#x2F;doc.rust-lang.org&#x2F;reference&#x2F;items&#x2F;static-items.html?highlight=Concurrency#mutable-statics" rel="nofollow">https:&#x2F;&#x2F;doc.rust-lang.org&#x2F;reference&#x2F;items&#x2F;static-items.html?...</a> requiring manual mutexes