<div dir="ltr"><div dir="ltr"><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">On Fri, Dec 14, 2018 at 4:52 PM Edmond Begumisa <<a href="mailto:ebegumisa@hysteria-tech.com">ebegumisa@hysteria-tech.com</a>> wrote:<br></div></div><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><br>
However, I fear that there is going to be a lot of abuse.<br>
<br></blockquote><div><br></div></div><div class="gmail_quote"><div style="font-family:arial,helvetica,sans-serif" class="gmail_default">I'm guessing there is going to be a lot of abuse as well. But I don't think that is different from using a large list where a map would do for instance. So lots of code has performance problems, uses excessive amounts of memory or otherwise slows down your system.</div><div style="font-family:arial,helvetica,sans-serif" class="gmail_default"><br></div><div style="font-family:arial,helvetica,sans-serif" class="gmail_default">As for the discussion on reading through your dependencies:</div><div style="font-family:arial,helvetica,sans-serif" class="gmail_default"><br></div><div style="font-family:arial,helvetica,sans-serif" class="gmail_default">There is a security aspect and a performance aspect. Both are important. Currently I think the best tool wrt. security is to have libraries define capabilities on what they do, and then verify those capabilities with a crash in the system. See e.g., OpenBSDs pledge(2) system call. Once a process pledges itself to a subset of all syscalls, it will be terminated if it ever calls one of the illegal targets. But as for the slowness, the best bet is to run benchmarks on your system and profile the code base extensively. People tend to make innocuously looking changes to a system---only for it to have catastrophic consequences on your software. </div><br></div></div>