The post mentions using `cargo vet` to organize audits of third party crates, discussed here a few months ago [0]. I'm more familiar with cargo-crev which does something similar, how do these auditing tools compare? The audit format [1] seems somewhat reasonable, but it doesn't include the review date and there's no mechanism to validate the authenticity of the auditors.
[0]: https://news.ycombinator.com/item?id=31719532
[1]: https://mozilla.github.io/cargo-vet/recording-audits.html
Also cargo-vet has some good ideas about how to suddenly introduce cargo-vet into an existing codebase.
I kind of, vaguely loosely, feel like running multiple 'workers' within a single process is just not a reasonable goal. Ultimately if you have a multi-tenant requirement you should be using separate processes and pinning them to separate physical CPUs, and hope that that is enough. Not to discourage this, I can't wait to look back in a decade and see how this all has changed.
edit: Also, there are other use cases. Like, maybe I'm a single tenant and I'm deploying multiple workers to a single VM. I trust myself, but it would still be nice to have it be hard for those boundaries to be violated - driving up the cost is sane.
It also sort of reminds me of the Sysiphean task of removing ROP gadgets from the Linux kernel.
As if users will not concede every requested permission to the first Monero miner that asks.
Imagine if every PDF viewer included a virtual machine that ran in the background while viewing the document.