Memory safe in D

Walter Bright newshound2 at digitalmars.com
Wed Mar 13 05:47:03 UTC 2024


On 3/12/2024 12:48 PM, H. S. Teoh wrote:
> (Even though in practice, having an application abort
> because of a null pointer can also become an issue, e.g., if a malicious
> outsider is able to trigger that condition consistently, it could be
> exploited in a DoS attack.)

The same goes for assert() failures, buffer overflow exceptions, and other 
runtime checks D inserts into the code.



More information about the Digitalmars-d mailing list