LOL, what are you saying? Vulnerabilities are precisely caused by UB |
Sorry, I meant stack overflow will be caught with no damage done.
SQL servers don't take untrusted input. They have logins. |
They don't take input from untrusted sources. It's up to the user to make sure the input is safe. SQL will happily delete everything if malicious input tells it to do so.
It shouldn't concern itself with anything other than converting sequences of characters into sequences of tokens. |
Depends on the programmer, I would certainly put it there. It would be completely inefficient to add checking anywhere else, and there's a lot of checks you may want to do.
You point the whole has been that you don't want to be prohibited from screwing up. You literally said "not saying don't add safer options, just don't prevent me from shooting myself in the foot". |
Where's the contradiction? Add the safer options, but also don't prevent me from shooting myself in the foot.
I'll choose when I wanna use the safer options or not. I've been repeatedly saying C++
has safe options and should continue to add more. What I'm saying is don't remove my ability to code dangerously should I choose to do so.
A "safe" language cannot permit code that could potentially lead to UB, even if it's perfectly safe when coded right. That would ruin C++ in my humble opinion.
If you write a language designed for safety, sure have unsafe blocks. I don't think badly of Rust at all. But C++ is not Rust and, I would argue, has nothing to gain from becoming copy of Rust. Rust already exists!