Replies: 8 comments
-
I actually wonder what are preferences here. I am personally heavy terminal Vim/Kakoune guy, and you can tell by the current One question: would it be an app running entirely as webasm/js on the client side? Security-wise I'm worried about it being an natural place to to attack and eg. present users with different files than what they really are etc.
As long as you encrypt them with user-provided passphrase (salt + keystretching), so that even when you get hacked they are not very useful, I don't see a big problem with it. If the whole app was running on the client, then you could maybe not even store it at all. Alternative method seems clunky - UX wise, defeating the biggest benefit of web-UI, IMO. |
Beta Was this translation helpful? Give feedback.
-
I don't see a way around that. Even if it was purely client-side, you'd have to trust that I've served you JS that does what it claims it does. Web browsers have no way to anchor that trust, so everything done by the website ends up being a circular tautology (e.g. I could try to make JS with reproducible builds and signatures, but then key verification code would come from me too). |
Beta Was this translation helpful? Give feedback.
-
I guess we will just have to accept it. I would still prefer people to use their local environments, but if a web UI gets someone to start using Maybe web UI could add some field in the proofs it is producing. Something like
|
Beta Was this translation helpful? Give feedback.
-
Yeah, having explicit agent relationship sounds good. In case the site is compromised, it'd help find the reviews. |
Beta Was this translation helpful? Give feedback.
-
The most important thing I think a web UI could provide is showing the current review status (whether from that web service's own trust root, or somehow being able to set the trust root), e.g. I was just thinking about giving Being able to provide the reviews from the web seems much lower priority to me than making it easy to see the trust status (especially for distrusted crates). |
Beta Was this translation helpful? Give feedback.
-
A service like that would be really useful indeed. |
Beta Was this translation helpful? Give feedback.
-
Can someone help me get started? I've got crates-io integration (crate download, extraction) code done, but I need:
|
Beta Was this translation helpful? Give feedback.
-
So more than a year ago I was investigating the whole reviewing crates / building trust for Rust ecosystem. My initial attempt was building a website. A side-goal was trying out Rust for web-project (Rocket), along with NixOs and NixOps for deployment etc. A had quite a bit stuff working, including github authentication: https://gitlab.com/hackeraudit/web/blob/master/src/auth/mod.rs I eventually realized that I just can't get people to use it, and stopped working on it. |
Beta Was this translation helpful? Give feedback.
-
I'm thinking about creating a website for reviewing code (or more specifically, adding it to https://crates.rs). I already have components to interact with crates.io, to unpack crates, to do syntax highlighting, etc. so it should be relatively easy to put together.
The workflow could look like this:
The upsides are:
thoroughness
level.But I'm not clear how to publish reviews for users. Logging with GitHub could give access to the proofs repo, but that still needs Crev's own identity.
I could create a new identity such as "user via crates.rs", and perhaps ask the user to trust that identity. That would be reasonable from WoT perspective, but I'd have to keep a ton of private keys.
I could create a commit, and then ask user to sign it from
cargo crev
(that might need a new feature incargo crev
)If GPG was used as the identity, then user could pull crates.rs' changes and GPG-sign them in a later commit.
Beta Was this translation helpful? Give feedback.
All reactions