The non-profit Rust Foundation has scored funding to build a dedicated security team to proactively identify and address security defects in the popular Rust programming language.
The Foundation said the new team will be funded by investments from the OpenSSF’s Alpha-Omega Initiative and software supply chain security firm Jfrog and will immediately work on a security audit and threat modeling to measure the economics of securing Rust.
“The first initiative for the new Security Team will be to undertake a security audit and threat modeling exercises to identify how security can be economically maintained going forward. The team will also help advocate for security practices across the Rust landscape, including Cargo and Crates.io, and will be a resource for the maintainer community,” the Foundation said in a statement.
The OpenSSF Alpha-Omega Project is an ambitious effort aimed at tackling open source software security through direct engagement of software security experts and automated security testing. The Project is funded collectively by Microsoft and Google.
“There’s often a misperception that because Rust ensures memory safety that it’s one hundred percent secure, but Rust can be vulnerable just like any other language and warrants proactive measures to protect and sustain it and the community,” said Bec Rumbul, Executive Director at the Rust Foundation.
[ READ: Cost of Sandboxing Prompts Shift to Memory-Safe Languages. Too Late? ]
Rumbul said the new Rust Foundation Security Team will be able to support the broader Rust community with the highest-level of security talent and help ensure the reliability of Rust for software developers around the world.
Of course, this is just a start. We hope to continue to build out the team in the coming months and years,” Rumbul added.
Separately, maintainers of the Go programming language have announced new support for vulnerability management as a first step towards helping Go developers learn about known vulnerabilities that may affect them.
The Go initiative includes a vulnerability database and a new govulncheck tool that offers a low-noise, reliable way for Go users to learn about known vulnerabilities that may affect their projects. Govulncheck analyzes codebases and only flags vulnerabilities with impact based on which functions in the code are transitively calling vulnerable functions.
Related: Cost of Sandboxing Prompts Shift to Memory-Safe Languages. Too Late?
Related: Google Working on Improving Memory Safety in Chrome
Related: Microsoft Launches JIT-Free ‘Super Duper Secure Mode’ Edge Browser
Related: OpenSSF Alpha-Omega Project Tackles Supply Chain Security