wg
wg copied to clipboard
RustSec integration into DevOps workflow
We need to make discovering that you need to apply security updates and applying them it as easy and obvious as possible.
Production deployments have higher security requirements than development environments. Therefore auditing and fixing deployed binaries is higher priority than auditing source code.
Hard questions:
- If you run Rust code in production, how do you get notified that you need to apply a security update? That's assuming version info for the production binary even exists, see #14
- How do you set up a pipeline to apply these updates automatically?
- How should fixes in compiler or standard library bugs be applied? Currently there is no "rebuild everything that was ever installed" command in Cargo. Also, how do we notify people that they need to rebuild everything?
- How should security updates to statically linked C libraries be handled? What if the build is for Windows where the only reasonable way to build against C libraries is to bundle them with the
-syscrate? Should the maintainer of Rust-syscrate be responsible for security updates to the C code, and if so, how do we make that manageable for the maintainer?
Discussion on internals forum: https://internals.rust-lang.org/t/pre-rfc-reviving-security-advisories-in-crates-io-rfc-pr-1752/9017