rust-secure-code / cargo-sandboxLinks
Perform Cargo builds inside of a sandboxed environment
☆52Updated 6 years ago
Alternatives and similar repositories for cargo-sandbox
Users that are interested in cargo-sandbox are comparing it to the libraries listed below
Sorting:
- Build and verify byte-for-byte reproducible Rust packages using a Cargo-based workflow☆59Updated 4 years ago
- RustPräzi: Representing crates.io as a call-based dependency network☆82Updated 6 years ago
- A safe and reliable process manager☆43Updated 5 years ago
- A Rust compiler plugin and support library to annotate overflow behavior☆107Updated 2 years ago
- Rust implementation of Miscreant: misuse-resistant encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆46Updated 4 years ago
- Security-oriented protobuf-like serialization format with "Merkleized" content hashing support☆120Updated 2 years ago
- Discover funding links for your project's dependencies.☆68Updated last year
- Helpers for clearing sensitive data on the stack and heap☆54Updated 5 months ago
- Advisory cross-platform file locks using file descriptors☆82Updated 7 months ago
- Check your crate for (possible) no_std compatibility☆213Updated 2 years ago
- Combine a reader + writer into a duplex of Read + Write☆45Updated 5 years ago
- "Freedom from syn": Proc macro tools for operating on token trees☆108Updated 5 years ago
- Rust implementation `libsodium/utils`.☆51Updated 10 months ago
- ☆54Updated 4 years ago
- Token tree calling convention☆80Updated 2 years ago
- ☆40Updated 6 years ago
- A pure Rust implementation of BLAKE2 based on RFC 7693.☆64Updated 5 months ago
- A tool for finding large memcpy's in llvm ir☆61Updated 6 years ago
- ASN.1 library for Rust☆47Updated last year
- Rust serializer library☆88Updated 2 months ago
- Machine scalar casting that meets your expectations☆78Updated 4 years ago
- Spawn processes with arbitrary closures in rust☆113Updated 4 years ago
- A Cargo plugin to list unsafe code in a Rust project.☆46Updated 7 years ago
- Execute your code on the Rust ecosystem.☆185Updated 3 months ago
- Proc macro for using doc comments as context for errors/logs/profiling/whatever via `tracing`☆48Updated 3 years ago
- Have questions on the Rust Foundation? Ask here!☆88Updated 4 years ago
- ☆48Updated last year
- A `#[safe]` attribute for explaining why `unsafe { ... }` is OK.☆81Updated 6 years ago
- This crate guarantees that your application is free of panicking branches☆178Updated 6 years ago
- JS affine☆69Updated 5 years ago