Skip to content

TinyGo and Security

Ron Evans edited this page Jul 1, 2025 · 1 revision

TinyGo and Security

These are a few ways that we could evaluate TinyGo from a secure computing perspective.

Use cases

Evaluations

  • Where does TinyGo use unsafe? Could we reduce use of unsafe?

  • What is the state of the TinyGo runtime? How likely is it that the memory allocator, GC, handlings of stacks, or scheduler contains bugs that have a security impact?

  • What is the state of the TinyGo compiler toolchain? Especially glue between the official Go compiler frontend, and the LLVM backend.

  • What is the state of TinyGo supply chain security? How wide and deep is the dependency tree?

  • Possible guidelines for ensuring a secure development lifecycle

  • Signed software releases, key generation, and key access/handling.

  • Bug bounty program

Clone this wiki locally