Skip to content

Commit c39fa95

Browse files
david-a-wheelerthomasnyman
authored andcommitted
Add links from Compiler Options Hardening guide to Concise guides
Signed-off-by: David A. Wheeler <[email protected]>
1 parent eb6c6ba commit c39fa95

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

docs/Compiler-Hardening-Guides/Compiler-Options-Hardening-Guide-for-C-and-C++.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,8 @@ In this guide, we use the term *production code* for executable code intended fo
5454

5555
Developers should ensure that both their production code and their instrumented test code pass their automated test suite with all their relevant options. We encourage developers to consider it a bug if the program cannot be compiled with these options. Those who build production code may choose to omit some hardening options that hurt performance if the program only processes trusted data, but remember that it's not helpful to deploy programs that that are insecure and rapidly do the wrong thing. Existing programs may need to be modified over time to work with some of these options.
5656

57+
Flags can help counter some attacks, but not all. For more information on how to develop secure software, see the OpenSSF [Concise Guide for Developing More Secure Software](../Concise-Guide-for-Developing-More-Secure-Software). For more information on how to select secure open source software, see the OpenSSF [Concise Guide for Evaluating Open Source Software](../Concise-Guide-for-Evaluating-Open-Source-Software).
58+
5759
## Background
5860

5961
### Why do we need compiler options hardening?

0 commit comments

Comments
 (0)