흥미로운 이야기네요.
내 생애에서는 러스트로 드라이버 개발 못(안)할듯 했는데…
그날 올수도 있겠네요…
–늙은개발자
C/C++ 기반의 코드 베이스가 지닐 수 있는 보안 상의 위험성이 점점 더 많은 곳에서 공론화되고 있다보니 생각보다 빨리 그런 날이 오지 않을까 생각합니다. ㅎㅎ
좋은 기회가 오겠군요!! 오히려 커리어를 끊을 수 없게되는 좋은 일이 아닐까 싶습니다
(미국)국립 사이버 국장실 문서인데요,
Memory safety vulnerabilities are a class of vulnerability affecting how memory can be accessed, written, allocated, or deallocated in unintended ways.
Experts have identified a few programming languages that both lack traits associated with memory safety and also have high proliferation across critical systems, such as C and C++.
Choosing to use memory safe programming languages at the outset, as recommended by the Cybersecurity and Infrastructure Security Agency’s (CISA) Open-Source Software Security Roadmap is one example of developing software in a secure-by design manner.
2022년에도 이런 얘기가 있었네요. 한번 더 강조를 한 느낌이지 않을까요? 다만… 부서가(제가 알못이라…) 다른 것 같아서 연관성은 잘 모르겠네요 ㅎㅎ
Memory safe languages
Using a memory safe language can help prevent programmers from introducing certain types of memory-related issues. Memory is managed automatically as part of the computer language; it does not rely on the programmer adding code to implement memory protections. The language institutes automatic protections using a combination of compile time and runtime checks. These inherent language features protect the programmer from introducing memory management mistakes unintentionally. Examples of memory safe language include Python®, Java®, C#, Go, Delphi/Object Pascal, Swift®, Ruby™, Rust®, and Ada.
c++ 자제 권고[…] 건도 관련 내용 중 하나가 아닐까 생각이 듭니다.