Skip to content

Conversation

@jhogberg
Copy link
Contributor

@jhogberg jhogberg commented Dec 2, 2025

Our benefactors want a secure coding standard/guideline for Erlang, and in contrast to EEF's Secure Coding Recommendations they want it to be more along the lines of the SEI CERT Coding Standards. We need to have numbered and concrete rules, mappings to CWEs and OWASP risks and back, and must address the top N CWEs and OWASP risks.

This is an early draft to get a discussion started on how it should look, which recommendations/rules should be included, and so on. It is quite incomplete at the moment, and any and all feedback is most welcome.

@jhogberg jhogberg self-assigned this Dec 2, 2025
Copy link
Contributor

@bjorng bjorng left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Excellent language and sound advice. My only comments are nitpicks.

@jhogberg jhogberg force-pushed the john/system/secure-coding-documentation branch 3 times, most recently from dea105b to f0819a9 Compare December 4, 2025 11:48
@jhogberg jhogberg marked this pull request as ready for review December 4, 2025 11:48
@jhogberg jhogberg force-pushed the john/system/secure-coding-documentation branch from 55995be to b3c028e Compare December 5, 2025 09:05
@rickard-green rickard-green added the team:VM Assigned to OTP team VM label Dec 8, 2025
occur once the numbers reach several megabits in size, and will in any event
throw an exception instead of wrapping around or otherwise behaving in an
unsafe manner ([`CWE-190`]).

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we add some kind of disclaimer that the statements about memory safety, leaks, and so forth assumes that the VM implementation is correct.

And if so add that it is very unlikely that there exists an undiscovered bug that can be exploited for things like remote code execution since most parts of the VM is exercised thoroughly by all code that is run during normal operation.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No, I don't think that's necessary. Other languages (e.g. Rust) make strong claims about how safe they are without disclaiming that a compiler or runtime bug of theirs ruins everything, and I don't want a less technical decision-maker to get the impression that we're less safe than those languages just because we're more honest.

Co-authored-by: "Rickard Green <[email protected]>"
@jhogberg jhogberg force-pushed the john/system/secure-coding-documentation branch from b3c028e to cf6a601 Compare December 15, 2025 09:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

documentation team:VM Assigned to OTP team VM

Projects

None yet

Development

Successfully merging this pull request may close these issues.

8 participants