Conversation

I'm seeing something of a "sandboxing is dead" narrative popping up in light of new real-world attacks and growing interest in memory-safe development approaches (e.g. Rust). This framing seems inherently contradictory to me, and I would like to explain why. 1/9
5
116
Replying to
Even Rust people don’t think Rust is a complete alternate to sandboxing (anymore). Spectre and the like directly attack language-based safety. I actually don’t even understand how there could be a debate about this at this point.
1
15
Replying to and
Can also still have vulnerabilities in the much smaller amount of unsafe code trusted to maintain memory safety itself. Having only a tiny fraction of code trusted to maintain it instead of all doesn't mean those problems completely go away. Compiler/runtime bugs exist too.
1
3
There are also non-memory-safety bugs protected against by a sandbox. Memory safety and lack of dynamic code execution eliminate most remote code execution issues but those are not the only kinds of vulnerabilities. Can have data / file access vulnerabilities and other issues.
1
2