Many security vulnerabilities also stem from implementations that care more about speed than correctness. If you want a fully secure virtualised system, integrate with Bochs and suffer Pentium 4 performance.
It’s a big risk/reward system. Also, many exploits would work just as well in safe and verified Rust, because quite a few of them are logic bugs rather than memory access vulnerabilities. It doesn’t really matter how safe your language is when you add a line of code like if user_name.ends_with("devtest123") to make debugging easier and end up pushing that code to production.
Many security vulnerabilities also stem from implementations that care more about speed than correctness. If you want a fully secure virtualised system, integrate with Bochs and suffer Pentium 4 performance.
It’s a big risk/reward system. Also, many exploits would work just as well in safe and verified Rust, because quite a few of them are logic bugs rather than memory access vulnerabilities. It doesn’t really matter how safe your language is when you add a line of code like
if user_name.ends_with("devtest123")
to make debugging easier and end up pushing that code to production.