45
top 9 comments
sorted by: hot top controversial new old
[-] thingsiplay@beehaw.org 8 points 6 months ago
[-] Starfighter@discuss.tchncs.de 12 points 6 months ago

As long as people are using Rust, it will necessarily attract this kind of action. This won't be the last attack we will see.

I think the team has handled it quite well.

[-] Ephera@lemmy.ml 3 points 6 months ago

Damn, expected something like this to happen or, well, be detected after the big NPM attacks.

[-] INeedMana@piefed.zip 2 points 6 months ago

What are the proper crates that the malicious ones were pretending to be? (I'm new to Rust)

[-] fartsparkles@lemmy.world 4 points 6 months ago
[-] INeedMana@piefed.zip 1 points 6 months ago* (last edited 6 months ago)

Thanks :)

async_println is a part of fast_log?

[-] fartsparkles@lemmy.world 6 points 6 months ago* (last edited 6 months ago)

Both faster_log and async_println were purely malicious packages (not taken over and turned malicious).

I know faster_log is typosquatting / luring fast_log users but I’m not sure about about async_println (which was a clone of the malicious faster_log).

async_std::print is a thing so I guess trying to lure users who search crates before docs :shrug:

[-] nebeker@programming.dev 2 points 6 months ago

I mean, if you want your prints to be asynchronous you’re looking for trouble to begin with.

The previous statement is a joke.

[-] amgdvx@programming.dev 2 points 6 months ago

Seriously more effort and investment should be put into code scanners if we want a bright future to modern software development

this post was submitted on 25 Sep 2025
45 points (100.0% liked)

Rust

7919 readers
6 users here now

Welcome to the Rust community! This is a place to discuss about the Rust programming language.

Wormhole

!performance@programming.dev

Credits

  • The icon is a modified version of the official rust logo (changing the colors to a gradient and black background)

founded 2 years ago
MODERATORS