Security
At the moment, rust-analyzer assumes that all code is trusted. Here is a non-exhaustive list of ways to make rust-analyzer execute arbitrary code:
-
proc macros and build scripts are executed by default
-
.cargo/config
can overriderustc
with an arbitrary executable -
rust-toolchain.toml
can overriderustc
with an arbitrary executable -
VS Code plugin reads configuration from project directory, and that can be used to override paths to various executables, like
rustfmt
orrust-analyzer
itself. -
rust-analyzer’s syntax trees library uses a lot of
unsafe
and hasn’t been properly audited for memory safety.