Replies: 2 comments 14 replies
-
Rather than runtime permission checks (Deno's model) which could potentially have bugs that lead to permissions being ignored, Bun plans to have binary dead code elimination based on statically analyzing what features/native modules are used by the code. Instead of checking if a feature is allowed at runtime, it is safer to just not have potentially unsafe or undesired code in the binary to begin with. Can't have bugs in code that doesn't exist A different build of Bun will exist for each feature along with tooling for choosing the exact build of Bun with allowed features included. This will probably be limited to an edge runtime build of Bun (for Linux) focused on production usage in servers. This is not implemented (or started) yet, but that's the plan. Bun might explore runtime permission checks in the future, but it just doesn't seem as sound as not including the code to begin with. Additionally, Bun will undergo regular security audits once a little more stable |
Beta Was this translation helpful? Give feedback.
-
Not entirely on this topic of permissions but I am building new Bun Security course and am interested to learn and hear what other topics and domains would be of interest to teach and educate on (specifically to Bun but also anything adjacent that makes sense). |
Beta Was this translation helpful? Give feedback.
-
I've searched the GItHub issues and community, but didn't really find anything that told me about how Bun is thinking about and handling security. It's super fast - okay, but does that mean that security aspects are not that much in the focus of its developers (at least compared to Deno)? Is there any documentation about security concepts that I just didn't manage to find? Thanks a Bunch! 🥯
Beta Was this translation helpful? Give feedback.
All reactions