secnull
systems nominal feed · live 14:23 UTC
8
audits
0
open cve
archivedispatchesdispatch 089
issue 089 · Mar 30, 2026
— dispatch · crypto audit

As close to 'no notes' as this beat gets. Read the code.

A modern TLS implementation that takes safe defaults seriously, documents its threat model, and maintains a test corpus that embarrasses older libraries. The few low findings are doc nits.

rustls A
A modern TLS implementation that takes safe defaults seriously, documents its threat model, and maintains a test corpus that embarrasses older libraries. The few low findings are doc nits.
96 / 100·0 high·0 med·cargo
auth A
Axis score 98 / 100.
auth
crypto A
Axis score 98 / 100.
crypto
supply A
Axis score 95 / 100.
supply
docs A
Axis score 92 / 100.
docs

§1 · Context

rustls is a TLS 1.2 + 1.3 implementation written without unsafe
outside of FFI boundaries. Its safe-by-default posture is documented,
defended, and tested. Running our compliance corpus was, frankly, a
relief after months of reading JavaScript auth code.

§2 · Findings

One low finding: the crate-level README could more prominently explain
the dangerous_configuration feature flag and why you should never set
it. Merged in v0.23.

§3 · Supply chain

The release process is reproducible, attested, and the maintainers have
resisted the gravitational pull of adding "convenience" crates that would
expand the trust surface. That discipline compounds.

§4 · Bottom line

If you can replace a C TLS library with rustls, do so.