| Crates.io | expand_any_lifetime |
| lib.rs | expand_any_lifetime |
| version | 0.1.2 |
| created_at | 2024-02-20 16:12:53.987988+00 |
| updated_at | 2024-02-20 16:22:50.223435+00 |
| description | expand any lifetime to 'static with no unsafe rust |
| homepage | |
| repository | |
| max_upload_size | |
| id | 1146572 |
| size | 2,863 |
DO NOT USE THIS IN ANY CODE YOU DON'T WANT MESS UP
You want to expand some lifetime without either call *::leak()
An issue had opened for decades
In essence, it's because static checking of multi-level lifetimes itself is inherently complex
Also check examples in cve-rs,
to find 'what kind of memory vulnerabilities we could face with unconditional lifetime expand'?