Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

My understanding is that, even though tmux-rs is written in a safer language, it still can't beat the stability of an old battle-tested well-maintained project written by a group of highly competent developers.

Every new project is bound to have bugs that need to be ironed out during the time.



They wrote everything in unsafe rust where its very possible to segfault. This is not a normal C to Rust port. In a normal port you would never aim to have 100% unsafe rust code - rather you would hive off small parts of your application where you need unsafe so its highlighted and auditable. This is clearly an excerise for fun.


I think it is a normal porting process, it's just only half-finished at this point. The conversion to safe Rust is yet to come.


No, the issue is that doing a direct translation from a fundamentally unsafe language like C can't fix safety issues.

You'd have to do a proper rewrite, in which case you could write safe code from the start.

> Every new project is bound to have bugs that need to be ironed out during the time.

Not on the level of the kind of critical security and reliability bugs that unsafe languages foster. That's why CISA and the FBI both strongly recommend memory-safe languages.


My understanding is that the author was referring to there being more segfaults in programming than in gardening.


Both can be true at the same time in that sentence


It’s just because there are a lot of unsafes, and because the translation from C to Rust introduced semantic-mismatch bugs




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: