Bun Rust rewrite: "codebase fails basic miri checks, allows for UB in safe rust"
247 points by ndiddy 4 hours ago | 155 comments

dangerlibrary 2 hours ago
There's a book that changed a lot of the way I think about attention and media [0]. The book isn't very good, but it flags something relevant here. There is a huge asymmetry between the reach of a big, flashy announcement (here: bun was re-written in memory-safe rust in a couple weeks), and the relatively small reach of a correction (often just a footnote on an old article, here a GH issue).

This asymmetry is well understood by marketing and PR professionals, and actively exploited.

[0] https://en.wikipedia.org/wiki/Trust_Me,_I%27m_Lying

reply
kibwen 2 hours ago
> a big, flashy announcement (here: bun was re-written in memory-safe rust in a couple weeks)

Did they even claim it was "memory-safe"? Every discussion of this topic has had dozens of comments noting that their vibed codebase is bursting at the seams with unaudited unsafe blocks, lightly reviewed by people who seem to not only seem to not understand Rust, but who seem incensed at the idea of needing to understand any programming language in the first place.

reply
dathinab 2 minutes ago
they didn't actually the port is trying to be mostly 1:1 and in turn mostly unsafe rust

rust memory safety was a reason for the port, but for this you have to fully conclude the port, i.e. not just convert it to mostly unsafe rust doing mostly the same as zig but then "fix" the code until it's mostly safe and somewhat idiomatic.

the main issue here is that there is no blog post adding context a lot of people are missing, just a lot of "sensationalized" HN titles linking to GH PRs which miss a lot of context and people only reading the headline and blind making assumptions.

reply
veidr 2 hours ago
No, and there's been a lot of confusion about that on this website.

They did cite Rust's safety as a motivating factor for the port. That doesn't imply trying to achieve that simultaneously with the language change — which is good, because that would be insane. (Or, if you prefer, even more insane.)

You cannot faithfully port a codebase to a new language while also radically re-architecting it. You have to choose.

They want the safety benefits of Rust going forward; i.e., after it's finished, when they then write new code in Rust.

reply
swiftcoder 59 minutes ago
Yeah, exactly. The typical approach is to do a mechanical translation such as with rust2c, that is full of unsafe, and then gradually refactor safety in.
reply
Dylan16807 53 minutes ago
But nobody makes announcements and blog posts about running that.
reply
pgporada 33 minutes ago
There's several blog posts here. https://www.memorysafety.org/initiative/av1/
reply
Dylan16807 27 minutes ago
And the first post is about the team working on the project, with about two and a half sentences on c2rust, and making it very clear they just started.

The newer posts go into detail about the rearchitecting that follows.

reply
Ar-Curunir 37 minutes ago
And indeed, the bun team has not done that
reply
parchley 2 hours ago
The author kept bragging about classes of bugs that would not happen with Rust.
reply
Anon1096 60 minutes ago
A bug-for-bug port to Rust is the first step to fixing that. Assuming the port is actually 1:1 without any behavioral changes, these bugs already exist in the Zig code. The difference is now it's known where effort can be dedicated in order to one day have a memory-safe release of Bun. People have absolutely lost their mind over this and completely forgotten the benefits Rust gives you. I feel like I've gone back 10 years reading threads about the Rust port of Bun these are the exact same arguments we see from people advocating continued use of C++.
reply
awesome_dude 30 minutes ago
> People have absolutely lost their mind over this and completely forgotten the benefits Rust gives you.

To be fair this is the type of reaction to be expected with all of the evangelism going around touting Rust as some pure beast incapable of error.

> these are the exact same arguments we see from people advocating continued use of C++.

Not really - people pushing Rust claim that switching to their new found lord and saviour will cure all evils and save everyone. The truth is - as you're pointing out - the bugs stay, maybe even more are created too.

Ports/re-architectures/rewrites always do this - promise to end all ills, and failing to deliver.

reply
pdimitar 17 minutes ago
And yet, all I ever see are attacks against these convenient boogymen with artistic exaggerations like yours... but I never see the boogymen themselves.
reply
awesome_dude 7 minutes ago
You've never seen the Rust evangelists?

I am genuinely jealous.

Also, I know you made a typo, but it did make me laugh

Bogeymen is what you meant

Boogymen reminds me of the joke in Millenium Man (How do you make a handkerchief dance - put a little boogie in it)

reply
Henchman21 46 minutes ago
Its almost like AI is rotting our brains?
reply
CamouflagedKiwi 42 minutes ago
They didn't have to. There's a widely held assumption that Rust == safe, or safer than anything else.
reply
scuff3d 44 minutes ago
[dead]
reply
rcxdude 2 hours ago
Hmmm, given the general mood in this case, I feel like there's a lot of people keen to find any criticism of the code they can and amplify it as possible. Most of it strikes me as relatively shallow at the moment, though (that is, apart from the fact that merging such a large LLM assisted port is certainly a, uh _bold_ move (to put it lightly), there's not much that people are pointing out about the actual result that feels like it's worse than any other port in progress, but there is definitely a lot of hay being made about any issue that is found).
reply
antonvs 12 minutes ago
> Most of it strikes me as relatively shallow at the moment

It is. We’re what, a week into this exercise? Absolutely everyone criticizing it, with no exceptions, is behaving like a micromanaging middle manager who couldn’t even dream of doing the work themselves.

I half want to start a list of “people to ignore”, but such people tend to expose themselves in every other comment anyway.

reply
whimsicalism 2 hours ago
Pretty typical of reddit-resembling sites like HN. People here are very politically, uh, involved.
reply
pavel_lishin 2 hours ago
Is this the concept that's referred to in the quote "a lie can travel halfway around the world before the truth puts on its shoes"?
reply
kakugawa 30 minutes ago
You could view it as a specific application of the quote.

In your quote, there is no time-dependency between the lie and the truth. Whereas here, it's an attractive lie (easily parsed, great narrative), followed up by truths (that need more than surface-level analysis).

reply
Aurornis 38 minutes ago
I thought you were going to call out the problem in the other direction: There has not been a "big, flashy announcement" because the port is a work in progress. It's not done or released. The only big flashy announcements I see are these drive-by dunk attempts on the work in progress code combined with attempts to imply that they said it was done or perfect.

The rewrite was a code translation meant to be a starting point.

> a big, flashy announcement (here: bun was re-written in memory-safe rust in a couple weeks), and the relatively small reach of a correction (often just a footnote on an old article, here a GH issue).

The Bun team never made a big announcement that the code is now memory safe. They've been clear that this is the starting point.

Anyone expecting it to be perfect immediately and to have solved all of the memory problems in the original Zig code is arguing with an announcement they imagined, not what the Bun team has said.

Did anyone try to map this code back to the original codebase to see if this memory problem exists in the original codebase?

reply
tonfa 6 minutes ago
> Did anyone try to map this code back to the original codebase to see if this memory problem exists in the original codebase?

FWIW what is being discussed is not memory problems, it's breaking rust invariants (the unsafe code has to follow specific rules, e.g. annotate lifetimes properly).

reply
giancarlostoro 2 hours ago
Not just marketing and PR, the mainstream media knows that pushing out BS and then retracting it later can have lasting effects because people will remember the original article / headline, and never see the correction.
reply
alpinisme 9 minutes ago
I don’t think the media care about having lasting effects. They just want to catch the wave of interest and not wait around and let someone else get the scoop while they fact check or add nuance.
reply
beberlei 2 hours ago
only the mainstream media knows about this? Quite odd to qualify media this way here, when most of all media uses this mechanism. We also forgot politicians who are experts in this field.
reply
giancarlostoro 32 minutes ago
Ctrl + F "only" is only in your messaging not mine. I never said they were the only ones doing this? It's not just politicians, celebrities know about this and will use it to their advantage. Whoever makes the headlines first might have a stronger sway over their adversaries. I'm not even poking at any side in particular, this is reality across the board unfortunately. People will just blindly take and believe the primary headlines.
reply
smasher164 2 hours ago
What I don't understand is if they were going to translate Zig to unsafe Rust, why not just build a translation tool for it? You could do a one-to-one mapping of language constructs, hardcoding patterns in your codebase, and as one friend put it "Tbh they could've just hooked up zig translate-c to c2rust". They would get deterministic translation, would probably have not been a heavy investment to build, and the output would have the same assurances as the input.

In this case, I would trust the output even less than the input. The input was memory-unsafe but hand-written. The output is memory-unsafe but also vibe-coded and has had no eyeballs on it. What is the point of abusing agentic AI for this use-case?

reply
Animats 59 minutes ago
> "Tbh they could've just hooked up zig translate-c to c2rust".

Have you ever seen what comes out of c2rust? It's awful. It relies on a library of functions which emulate unsafe C pointer semantics with unsafe Rust.

A few years ago, when I was struggling with bugs in OpenJPEG (a JPEG 2000 decoder), someone tried running it through c2rust. The converted unsafe rust segfaulted at the same place the C code did. It's compatible, but not safe.

Main insight: don't do string manipulation in C or unsafe Rust. It's totally the wrong tool for the job.

reply
swiftcoder 40 minutes ago
> The converted unsafe rust segfaulted at the same place the C code did. It's compatible, but not safe

That is indeed the point of c2rust. It gives you a baseline that is semantically identical to the original codebase, and with that passing the full test suite, bug-for-bug, you can then start gradually adopting rusty idioms to improve the memory safety of the codebase.

reply
Animats 19 minutes ago
What comes out of c2rust is not intended for human consumption. It's more verbose than the original and harder to work on, but no safer. You lose the C idioms that people understand, while not gaining Rust idioms. It's like working on compiler-generated assembly code by hand.

2022 discussion on HN.[1]

There's a DARPA funded effort called TRACTOR, Translate All C To Rust, which has funded some efforts to develop a usable translator.[2] It's about 10 months after award, with no reported progress. I've been checking the personal sites of the academics involved, and they barely mention the project, although $5 million has been allocated to it.[3] The approach comes from U.C. Berkeley - let the LLM generate slop, check it using formal methods.[4] Not expecting near-term results.

[1] https://news.ycombinator.com/item?id=30169263

[2] https://csl.illinois.edu/news-and-media/translating-legacy-c...

[3] https://chandrasekaran-group.github.io/

[4] https://metalift.pages.dev/

reply
Animats 39 minutes ago
The module with the code mentioned is at [1]

This is awful. They have some internal string format borrowed from a Zig library where the address of the item is in the low end of a pointer and the length is at the high end. Why are they doing that in 2026? It lets you save a few bytes at best. It doesn't enforce the Rust rule that strings must be strict UTF-8. It's totally alien to the safe way Rust handles strings.

[1] https://github.com/oven-sh/bun/blob/main/src/bun_core/string...

reply
mananaysiempre 13 minutes ago
For the same reason the V8 team bothered to set up a 32-bit addressing scheme for the GC heap even on 64-bit platforms, I imagine? The bytes add up when there’s enough of them.
reply
wrs 54 minutes ago
What they’ve done here isn’t safe either, and doesn’t have the consistent translation of rust2c.
reply
xienze 24 minutes ago
Sure, but the point remains. They could've used Claude to build a Zig to Rust converter, ended up with something that was both deterministic _and_ beneficial to the wider community.
reply
rattray 51 minutes ago
> why not just build a translation tool for it?

They did ;) a highly dynamic one...

reply
giancarlostoro 28 minutes ago
I mean, LLMs have been really good at translating code for a while now, which is why I'm more surprised that others are surprised this happened. They claim its a marketing trick despite the fact that they have to manage and maintain a fork of Zig if they don't switch languages.
reply
mr_00ff00 54 minutes ago
“Tbh they could've just hooked up zig translate-c to c2rust”

This doesn’t work like you think it does. These things are full of errors and make the code very verbose and hard to reason about. It works with small apps, not entire rewrites.

reply
lioeters 24 minutes ago
That would have been the proper way to port a codebase to another language, by parsing the syntax tree and applying deterministic and verified transformations.
reply
whateveracct 59 minutes ago
> What I don't understand is if they were going to translate Zig to unsafe Rust, why not just build a translation tool for it?

AI disproportionately empowers the stupid and evil

reply
Qasaur 49 minutes ago
>What I don't understand is if they were going to translate Zig to unsafe Rust, why not just build a translation tool for it?

This would require experience, judgement, and most of all humility. Some vibecoders, in all their hubris, try to build a Tower of Babel with non-deterministic models and are shocked when the project inevitably fails.

reply
ModernMech 59 minutes ago
Because they aren't trying to raise billions of dollars to build a translation tool.
reply
pohl 2 hours ago
This doesn't seem surprising, given the straight translation that they prompted.

Couldn't a case be made that it's better to get Bun to the to the language with the stronger type system first and, once there, use that stronger type system as leverage for these kinds of improvements as a follow-on effort? It seems preferable to requiring perfection on the very first step.

reply
Aurornis 26 minutes ago
> Couldn't a case be made that it's better to get Bun to the to the language with the stronger type system first and, once there, use that stronger type system as leverage for these kinds of improvements as a follow-on effort? It seems preferable to requiring perfection on the very first step.

This is what they are doing.

They are working through the issues as they come in.

reply
kubb 51 minutes ago
They'll just need to update the prompt with "make sure there's no UB", and it should be good.
reply
fastball 2 hours ago
Yes, and seems pretty clear you can now backpressure the rewrite with tools like miri to have Claude Code automatically improve it.
reply
whateveracct 59 minutes ago
engineers will do anything to avoid actually coding
reply
winwang 50 minutes ago
This is, ironically, a pretty good idea. ...Minus the fact that you're presumably talking about having AI generate it all instead.
reply
npodbielski 47 minutes ago
Hey... I like coding! Does it mean I am not an engineer?
reply
muvlon 2 hours ago
It's not surprising that a mostly straightforward translation to (partly unsafe) Rust exhibits UB.

What is a bit disappointing is that the Rust code apparently has APIs that aren't marked unsafe but may cause UB anyway. When doing this kind of translation, I'd always err on the side of caution and start by marking all/most things unsafe. Or prompt the slopbots to do the same I guess.

Then you can go in and verify the safety of individual bits step by step.

reply
Kavelach 8 minutes ago
From what I read from the PR comments, the case is that the unsafe blocks behave in a way that allows for UB.

This is expected, because unsafe rust can leave your program in an unhealthy state, since the language doesn't doesn't hold your hand anymore.

reply
gpm 58 minutes ago
This issue is misleading.

The issue isn't the existence of undefined behavior that miri would catch. The issue is exposing an API that allows undefined behavior from safe code - which miri only catches if you go write the test that proves it.

This isn't an all together unreasonable thing to happen during an initial port of code from an unsafe language. You can, and the bun team seems to be, go around later and make sure that the functions where you wrap unsafe code does so correctly. Temporarily in a porting stage incorrectly marking some unsafe functions as safe isn't a real issue. It's a bit strange to merge it into the main repo in this state, but not a wholly unreasonable thing to do if the team has decided that they're definitely doing this. The only real issue would be if they made an actual release with the code in this state.

It's also a bit unfortunate that they didn't immediately set up their tests to run in miri if only because LLMs respond so well to good tests - I know they didn't do this not because of this github issue (which doesn't demonstrate that) but because there's another test [1] that absolutely does invoke undefined behavior that miri would catch. Though the code it's testing doesn't actually appear to be used anywhere so it's not much of a real issue. That said it's obviously early in the porting process... maybe they'll get around to it (or just get rid of all this unsafe code that they don't actually need).

[1] https://github.com/oven-sh/bun/blob/4d443e54022ceeadc79adf54... - the pointers derived from the first mutable references are invalidated by creating a new mutable reference to the same object. In C terms think of "mutable reference" as "restrict reference which a trivial mutation is made through". It's easy to do this properly, derive all the pointers from the same mutable reference, it just wasn't done properly.

PS. Spamming github just makes people less likely to work in the open. Please don't. We can all judge this work just fine on third party sites.

PPS. And we might want to withhold judgement until it's in a published state. Judging intermediate working states doesn't seem terribly fair or interesting to me.

reply
mohsen1 60 minutes ago
I was a little shocked that they could get it fully working in a week to be honest. My side project is a very similar ambition (https://tsz.dev) but I am in no way claiming success. i keep adding more and more tests to ensure things works. Even after all of TypeScript's own tests pass I am finding bugs which I was totally expecting.

The bar for matching tsc's behavior is really _really_ high. see:

https://github.com/type-challenges/type-challenges

I'm not against using LLMs to write a lot of code. But verification should be 100x more robust now that we can output code at this rate.

reply
cedws 37 minutes ago
I'm stunned that it went from 'this is an experiment' to merging a ~million lines of (likely) unreviewed code in a week. I have nothing against using agents but to rush something like this and leave the community blindsided seems extremely ameteurish. Like something you'd expect a bright eyed graduate engineer to do.
reply
singpolyma3 21 minutes ago
Blindsided? Has there even been a release yet?
reply
mohsen1 26 minutes ago
tsz for me is an experiment to see how can this kind of work be done better. With a slight difference that tsz is not a direct port and it's a different architecture. I'm also not claiming to have answers but I've learned a ton. A few things that works

- Test before code, Bun had lots of test so that's good but maybe they could start by asking Mythos to write like 20k additional tests that pass on Zig Bun first.

- Deterministic anti-slop features. LLMs love to solve the problem in the wrong abstraction layer or place. There are many ways to catch this with deterministic tests. I do this in tsz a lot

- Roadmap that constantly evolving by humans.

- Taking a pause and looking how the progress is going and undoing slop

- Fuzztest(https://github.com/google/fuzztest) style "trying to break things" with the powers of LLM

reply
hayd 23 minutes ago
I suspect they've been planning this and experimenting for many months. Along with the large existing test suite, they have lots of tooling for parallelizing agents and an unlimited token budget. So don't feel too bad..
reply
tapirl 40 minutes ago
Are there any evidences which prove the process was done in a week?
reply
pesnk 2 hours ago
That kind of error was expected. I don't see it as an issue against the rewrite. They kept the stable versions on Zig in case ppl needs stability. Eventually, the errors will get fixed.
reply
Xylakant 2 hours ago
That kind of error was entirely avoidable. There are well-known tools in the Rust ecosystem that detect this kind of error and while the tools do not detect all instances of UB caused by mistakes in unsafe blocks, it's still considered good practice to run them.
reply
dralley 2 hours ago
>There are well-known tools in the Rust ecosystem that detect this kind of error

Yes, tools like Miri, which this very post is about.

reply
Xylakant 2 hours ago
Indeed. My point is that just using the standard tools in the Rust ecosystem - like miri - would have trivially uncovered this error before it made it to the mainline.
reply
jonas21 31 minutes ago
This is an engineering choice: do you merge first and then fix the remaining issues or do you get everything perfectly clean first and then merge?

I've seen large rewrites and migrations take both approaches -- in my experience, the former usually works out better.

reply
Xylakant 24 minutes ago
In any practical application there'll be a known set of errors and I'm generally fine merging code that has known deficiencies. But personally, I'd not condone merging anything that causes UB. It undermines such a fundamental guarantee of the language that it should be detected and eliminated. And bun certainly rises to the level of software where I'd expect that the project runs all available tooling to detect such cases. Especially if you LLM - code it. "Do not cause UB" should be part of the test harness.
reply
xienze 15 minutes ago
I think the point is you should probably run that tool and fix all the issues _before_ merging into the master branch.
reply
jnwatson 2 hours ago
Indeed this was caught by a well-known tool, Miri, that detected this error.
reply
iamricks 2 hours ago
This Bun rewrite feels like a potential Mythos marketing stunt.
reply
Jcampuzano2 53 minutes ago
Not a single person on the Bun team nor Anthropic has yet done anything egregious to market this as anything but a swap to a more memory-safe language with better compiler guarantees.

Thus far most of the buzz and marketing has been entirely negative from people who are against AI.

My take is that most of the buzz is also tied to recent negative opinions of Anthropic themselves due to some of their recent decisions.

reply
wiseowise 57 minutes ago
* Spend God knows how many dollars in unlimited tokens to do the rewrite

* Make a huge deal out of it how “Claude Code enabled Bun team to rewrite 1+ mil of Zig lines to Rust” and write a blogpost, VCs are salivating

* Basic checks fail

* Let Mythos rip the codebase to shreds, spend God knows how much more

* Write a separate blogpost

* Charlatans and smooth brains clap and defend against “delusional anti-AI mob”

* VCs orgasm even harder

Clap, clap, clap. That’s how you make money, folks.

And btw, we need to get rid of software engineers now.

reply
NooneAtAll3 2 hours ago
just as overhyped and disappointing?
reply
boxingdog 53 minutes ago
[dead]
reply
applfanboysbgon 2 hours ago
[flagged]
reply
rcxdude 2 hours ago
I dunno, I am commenting on it mainly because I find the intensity of the anger and accusations of bad faith to be pretty out of proportion with what's actually happening, and I kind of value pushing back on such things to try to moderate the tone of the discussion (not as a devil's advocate thing per se, but more I am more likely to comment if I feel like the average vibe is unreasonable).
reply
jsnell 27 minutes ago
The HN guidelines specifically ask you not to do what you're doing, and say what to do if you have a genuine concern:

> Please don't post insinuations about astroturfing, shilling, brigading, foreign agents, and the like. It degrades discussion and is usually mistaken. If you're worried about abuse, email hn@ycombinator.com and we'll look at the data.

reply
applfanboysbgon 16 minutes ago
Huh, I didn't recall that. FWIW I have e-mailed them in the past and gotten detected abusers banned, but didn't this time because it's just a suspicion. Didn't realise posting about hunches was against the guidelines, though, that's my mistake.
reply
pavel_lishin 2 hours ago
I'm not sure that HN is that influential that buying up a few accounts would matter. To what end?
reply
wiseowise 54 minutes ago
If you can increase your reach, why not do it? Also, HN has better reputation among tech circles than Reddit and is less niche than other resources. Modern marketing hits everything.
reply
recitedropper 44 minutes ago
HN is enormously influential for programmers and employees within the tech industry. Who happen to be exactly who Anthropic, and other AI companies, desperately need adoption from...
reply
applfanboysbgon 2 hours ago
I think HN has an outsized influence in the industry, for its size. There are a lot of big tech employees and startup founders reading it. Account purchasing absolutely happens, I've discovered and gotten banned at least a dozen years-old accounts that were blatantly sold and puppeteered by bots in the past. The comments aren't obviously bot-written this time around, so I can't conclusively prove it happened in this case, but it is a thing that happens in general and something to be aware of. There's also vote selling to promote things onto the front page. Given how cheap shilling on HN is, and the fact that many will perceive it to be organic while always viewing straightforwards ads skeptically, I wouldn't be surprised if the cost:effectiveness ratio probably beats any other form of advertising.
reply
sporadicism 59 minutes ago
hn appears in google news now
reply
wiseowise 56 minutes ago
> I've seen a lot of what seems to be inorganic defense of this, including one post from an account that hasn't posted in over a year.

It’s just a standard Pavlovian response of a bootlicker, it can also be triggered if you mention “tax the rich” and “regulate AI hyperscalers”.

reply
rvz 2 hours ago
Finally someone gets the point of this.
reply
827a 6 minutes ago
After this was merged, my company made the decision to migrate everything away from bun and back to node. I don't say this lightly... Jarred is a guy that I held such immense respect for, and its sad to see the course he's charted for a project I spent a lot of time proselytizing internally. Its frankly a betrayal of trust.
reply
brokencode 31 seconds ago
I thought this was just like a fun proof of concept.. I didn’t realize they actually merged it to main. That seems pretty crazy to me.

There’s no way they had time to review the code. This just seems so wildly irresponsible for such an important and high profile project.

reply
impulser_ 15 minutes ago
What do you guys assume that a codebase from an unsafe language containing bindings to another unsafe language would appear perfectly implemented right away?
reply
quantummagic 33 minutes ago
I'm curious, but unable to ascertain, does the same problem exist in the original Zig code? Is this an issue introduced by the translation to Rust? Because if it is a problem that can be replicated in both code bases, it seems a point in Rust's favor, that the issue is easily identifiable with tools that exist in its ecosystem.
reply
K0nserv 26 minutes ago
I'm also curious about that. One thing to keep in mind: the invariants you have to uphold in unsafe blocks are quite stringent. I expect that in some instances the Rust code has new UB due to this.
reply
snailmailman 23 minutes ago
This case is wild and seems to perfectly encapsulate all the problems people complain about with vibecoded projects.

The "rewrite it in rust" commit is +1M lines of code. Humans haven't looked at that in depth. In about a week, they saw the tests passed and pushed it to main. Now people have started to look through it and are pointing out glaring issues. And the solution is just going to be "feed it to another AI and ask it to fix it".

The entire codebase is slop now. Nobody knows what it does. It manages to pass some tests, but its largely a black box just on the basis of humans haven't read it yet. The code isn't guaranteed to be anything close to 1:1 with the old codebase. Its probably vaguely shaped like the old codebase, but new bugs could be there, old bugs could be there, nobody knows anything yet.

Its going to be interesting to see how recoverable this is. They are almost certainly going to just hand every file to an AI, say "look for soundness issues and fix them" and then what? If AI is making huge, sweeping changes to the code so frequently that humans can't keep up, is that really maintainable? The only solution appears to be "even more AI" while anybody that looks closely gets scared away by the too-large-to-comprehend-and-entirely-slop codebase.

This kind of thing has been happening with many smaller projects already, but now its a larger project and happening in a much more public way, with the intent to replace human-written, mostly-understood code with slop. I suspect the same thing, with the same problems, is happening inside all the largest companies, just not quite as obviously.

reply
NooneAtAll3 2 hours ago
So Bun saga has been

"Zig, let me Ai you"

"no"

*Ai's Zig fork, suffers from memory bugs*

"Well I'm moving!"

*Ai's code into Rust, suffers from memory bugs*

reply
whimsicalism 2 hours ago
Sure. I'm completely unaffiliated and think Zig's AI stance is ridiculous & politically-motivated and a port is absolutely justified if they will not budge. Apparently I am deeply in the minority.
reply
kristoff_it 52 minutes ago
The no-AI policy of the Zig compiler project is for the compiler, other projects can do whatever they want.

Bun's fork of Zig was just an unsound hack that at best would have produced a strictly inferior speedup compared to our current work with incremental compilation, which is already plenty usable:

- June 2025 core team starts using it with the zig compiler itself https://ziglang.org/devlog/2025/#2025-06-14

- April 2026 https://ziglang.org/devlog/2026/#2026-04-08

> Zig's AI stance is ridiculous & politically-motivated

It's literally an issue with our business model to mess with our contributor pipeline, can't get more concrete than this.

https://kristoff.it/blog/contributor-poker-and-ai/

reply
Robdel12 47 minutes ago
https://ziggit.dev/t/bun-s-zig-fork-got-4x-faster-compilatio...

> An example of this is the changes to type resolution which happened in the 0.16.0 release cycle—these didn’t affect users too much, but had big implications for the compiler implementation. Before those changes, the compiler’s behavior was often highly dependent on the order in which types and declarations were semantically analyzed by the compiler. Some orders might result in successful compilation, while others give compile errors. Single-threaded semantic analysis prevented these bugs from causing user-facing non-determinism. The rewritten type resolution semantics were designed to avoid these issues, but Bun’s Zig fork does not incorporate the changes (and has not otherwise solved the design problems), which means their parallelized semantic analysis implementation will exhibit non-deterministic behavior. That’s pretty much a non-starter for most serious developers: you don’t want your compilation to randomly fail with a nonsense error 30% of the time.

There is a reason why, zig is upholding the quality and they hate it.

reply
applfanboysbgon 47 minutes ago
Zig rejected Bun's proposed contribution because it was a bad contribution, which they explained at length. Zig should not be made to "budge" on bad contributions. It seems you think Zig is unreasonable for rejecting bad code that happens to also be AI-generated, but believe it's reasonable for a project to be forced to accept bad code because it is AI?
reply
whimsicalism 15 minutes ago
No, I think Zig should reject bad AI contributions and accept good AI contributions. That is not Zig policy, they reject all AI-authored contributions.

Not sure why you're inventing a stance for me to be arguing against, when the Zig compiler stance is publicly articulated as exactly what I'm describing.

reply
applfanboysbgon 5 minutes ago
You specifically mentioned "a port is justified if they won't budge", which comes across to me as defending Bun's situation specifically, in other words expecting Zig to budge on Bun's bad contribution specifically and because they won't this slop Rust port is justified.

I think an outright rejection of AI contributions makes sense, regardless, and has nothing to do with politics. A Zig developer was forced into writing a long-form post to justify rejecting Bun's awful contribution (lest their PR be sullied, and then it was anyways), and the act of writing that post probably took 10 or 20x more human time and effort than Bun's contribution. Now multiply that by 100 for every random fucking moron with an LLM submitting a contribution. That is not sustainable. Open source maintainers of popular projects would have to make rejecting AI PRs their full time job and stop developing the project itself altogether, if they took them seriously and reviewed at length to conclusively identify whether a PR is good or bad. Given that 99.99% of AI PRs are bad, it's simply not worth it. You cannot possibly expect humans to spend more time reviewing code than drive-by contributors spent generating it, especially when many of them are unpaid volunteers. It's an absolutely ridiculous expectation.

reply
dtj1123 60 minutes ago
Philosophically motivated, sure. In what way is the Zig foundation's AI stance political?
reply
whimsicalism 58 minutes ago
I think that we only see these bans because AI has become such a massive political issue in the last year.
reply
wiseowise 53 minutes ago
Define “political” when it comes to Zig and AI.
reply
kelnos 26 minutes ago
You have to do better than that if you're going to accuse the Zig team specifically of this.
reply
Havoc 13 minutes ago
Neat - didn't know about the miri tool.

Will definitely use that going forward

Didn't find anything on my existing vibecoded rust projects but can't hurt

reply
prymitive 26 minutes ago
Any prediction market bets on what will they rewrite it into next week? Era of just-in-vibe software is here.
reply
missingcolours 27 minutes ago
Certainly disagree with "AIs are not good at writing Rust". We can discuss the pros and cons of AI coding in general but in my experience they do just as well with Rust as any other language. If anything I'm impressed with how seamlessly the models can work with Rust's ownership model.
reply
jadar 24 minutes ago
> Please consider not vibe coding rust as AIs are not good at writing Rust and also hire a real rust dev

Isn't the whole point of AI companies using Rust that it's explicit, safe, and AIs are fairly good at writing it?

reply
minimaxir 4 minutes ago
I suspect "Rust is fast/low memory utilization" is the more common value proposition, with memory safety as the bonus that can push it over other fast languages.

Related: If AI writes your code, why use Python? https://news.ycombinator.com/item?id=48100433

reply
9681722 16 minutes ago
So a "robobun" clanker responds to the issue and writes a fix (probably just papering over it). This is what Anthropic wants: Let the users do the work, train the fricking bot and claim the credit.

If you find a bug, just go straight to blog posts and CVEs to denounce this idiocy. It ranks higher on Google.

reply
cptroot 2 hours ago
Man that issue got way too many comments from non-contributors. I agree that this shouldn't have been merged in in it's current state, but that doesn't mean posting about it on GitHub is a worthwhile way to fix the problem.
reply
sigbottle 32 minutes ago
Sorry wasn't there a post literally like a week ago about this being a long term experimental branch and how we needed to not kick the hatchling while it's an egg?

1 week turnaround I guess is what they meant.

reply
tlarkworthy 2 hours ago
Maybe they want a quick switchover and the UB is replicating existing problems so it is net neutral for the codebase (but positive future coz developers can do future work on rust without synchronizing two codebase? ).
reply
tadfisher 2 hours ago
If that was true, then I would expect followups to reduce UB and unsafe in general, or at least requiring a lifetime for caller-owned memory.

But I think their true strategy is to have AI produce "fixes" like these which will end up infecting the entire codebase: https://github.com/oven-sh/bun/pull/30728

reply
K0nserv 39 minutes ago
> If that was true, then I would expect followups to reduce UB and unsafe in general, or at least requiring a lifetime for caller-owned memory.

It's been like a day since the merge, presumably such followups are coming.

reply
jojomodding 58 minutes ago
exactly. If they wanted to iterate on their port they would add lifetime annotations here, which are the tool Rust be uses to ensure safety. They're just kicking the unsafety block down the road. This accomplishes nothing and is not how you get Rust to deliver its safety promise.
reply
nsagent 2 hours ago
[dead]
reply
skrrtww 49 minutes ago
I think the only way to interpret a one million line LLM-generated diff with no proper reviews as an employee of Anthropic is that my company no longer has an interest in understanding, or even looking at, its own code.

I'd be concerned that by jumping onboard with this sort of development process I'd lose touch with how to engineer software in a detail-oriented or remotely rigorous way.

It also makes me question what sort of value the entire Bun project ever had if a drop-in replacement can just be thrown in here like it's nothing. Why do we need all these JS runtimes again?

The AI bubble is so large that we've also forgotten how useless and dumb a lot of software engineering labor was even before LLMs came along. We were already in a bubble.

All that is to say, I think it's useful to reframe some conversations about AI as, "if AI can accomplish this task, was it ever actually valuable?" I think for some specific things, the answer will be yes, but the tech industry has been huffing its own farts for so long I really don't think anyone has sight anymore of what's economically valuable in a ground truth sense. Much like LLMs themselves, this confusion pollutes the entire well of discourse about their economic utility.

reply
stellalo 2 hours ago
I speculate the real goal is to have that fixed over time, and then use it as precious training data for Rust capabilities
reply
whimsicalism 2 hours ago
It is really sad and unfortunate that coding has started falling under the omnicause. Low-denominator discourse is invading every space I find interesting and it is difficult to avoid.
reply
Hammershaft 47 minutes ago
I agree. I'm as skeptical as many commenters but I also think the degree of polarization in HN around this technology and the degree to which people are calling those with different views shills or naysayers is pretty sad.
reply
unethical_ban 11 minutes ago
My grandfather was a tailor, and one day a client came in asking for the status of his suit getting clean. My dad as a kid grabbed the unfinished suit and showed the man, who was frustrated at the lack of progress.

My grandpa told my dad never to show a client a work in progress - You told them when you'd get the work done, and they can see the finished result when it's ready.

It's just a story so don't wrap yourself around the axle with counter-examples. I think it's fair to say that an open-source project going through a language translation is going to have transitional periods as they shake things out, and criticizing every snapshot as some proof that they're incompetent is useless.

reply
stavros 2 hours ago
UB = undefined behaviour, for anyone else who was puzzled.
reply
wg0 41 minutes ago
Not a good advertisement for both Anthropic. Or bun.
reply
CamouflagedKiwi 39 minutes ago
This was 100% a predictable outcome after Bun was acquired. Of course they were going to do something like this.

What would have been significantly better is just rewriting Claude in a language that's actually well suited to what it's doing in the first place (which could well be Rust, Codex is written in it as prior art). It's funny how the vibe coding promoters are keen on things like this, rewriting other codebases as fast as possible with little quality checking, but they are still defensive of their own code.

reply
frumplestlatz 47 minutes ago
Step 1: Vibe-code a buggy, poorly-performing, 500k+ LoC desktop-installed monstrosity in TypeScript to implement a trivial TUI. Proudly note that you’re meeting a 16ms frame budget … for a trivial chat UI.

Step 2: Purchase an entire company for a product that, if you squint, might help paper over the entirely predictable problems that arise from using the wrong tools to implement the wrong architecture, because surely the solution isn’t reevaluating your original engineering choices.

Step 3: Perform a buggy, vibe-code rewrite of the tool you just bought. A tool you only need because — for whatever internal political reasons — sunk cost means you can only keep digging.

Step 4: ???

reply
dzonga 19 minutes ago
said it in another comment [0] - that the whole rewrite thing is just a marketing exercise by LLM merchants to try sell you plebs that their wares "work"

[0]: https://news.ycombinator.com/item?id=48078224

reply
tomaytotomato 2 hours ago
This had to happen, for many reasons:

- Its a throw thing at the wall and see what sticks situation

- LLMs will improve*

- Using LLMs in an agentic way will improve (git worktrees, sliced PRs, spec driven steps)

So what happened here is a mess, but you gotta break a few eggs to make a souffle.

It's a learning step and I am glad it happened, there will be so many things to debrief from this.

I don't use Bun or Rust but fair play to them having a punt.

<Shameless plug> I have been working with Claude code to spec out and bring back to life a Spring Boot starter library for Apache Solr search

https://github.com/tomaytotomato/spring-data-solr-lazarus

There were a few points I had to steer it but the result has been a good implementation.

reply
mcdonje 2 hours ago
A souffle has not been made
reply
tomaytotomato 2 hours ago
Indeed, more of a frambled egg. Lets see what happens in two years time.
reply
localhoster 2 hours ago
Dumbest point ever. There is no value for this issue. I don't agree with the way they did the rewrite, but they did the rewrite, and this post contributes nothing, beside making the author seem childish. If it had any real contribution I would have waved it off, but it really doesn't. This tribalism and "I'm better than you"-ism and the same reason everybody hated the stack overflow community, and the rust community as well.
reply
fgfarben 56 minutes ago
The issue author is most likely quite literally a child.
reply
simonreiff 8 minutes ago
Holy cow:

architector4@AGOGUS:/tmp$ git clone --depth=1 'https://github.com/oven-sh/bun' Cloning into 'bun'... … architector4@AGOGUS:/tmp$ cd bun/ architector4@AGOGUS:/tmp/bun$ find -type f -name '*.rs' -exec grep unsafe {} \; | grep -v '//' | wc -l 13255

....Thirteen thousand two hundred and fifty five lines without comments with the word "unsafe" in them in Rust code files across this rewrite.

This is so gross.

I'm a founder of an early-stage startup. I built a precision-editing tool system (called HIC Mouse). It provides coordinate-based addressing, staged batching with atomic rollback, embedded agent guidance, and more. It works well, it's available on VS Code Marketplace, and I've worked for a year and am still grinding every day, working so hard, just to get people to think about trying it, and to get attention paid to it. I did rigorous, careful benchmark research to make sure I wasn't just fooling myself. I incorporated, built a sales pipeline, changed my life by taking a chance and launching a business, and I pound the pavement and toil in obscurity every day and night, trying so hard to get interest in my product. I check every diff painstakingly before committing. I may make tools for AI agents but I am unbelievably careful about reviewing and thoroughly testing their code, and usually rather ruthlessly editing quite a bit further beyond any initial version drafted, long before deciding it is good enough to ship. I take enormous pains to get things right and worry constantly about whether I'm doing enough to make HIC Mouse secure and performant for my users. All I want is to make my users happier and to give them a genuine way to get "surgical, precise edits" that "don't touch the other lines", like we all ask of our AI agents over and over all day if we're using AI.

Or maybe not. Here we have Bun. Who cares about 90K GitHub Stars and massive community engagement -- just go crap all over them, all at once, with this AI tripe that you obviously neither tested in any meaningful manner, nor documented, nor read, I am assuming, before merging the whole bloated mess to production. What a disgraceful way to treat your users! I would be so grateful if I had a tiny fraction of the interest in my project that the Bun team has. I could never imagine shipping this garbage in a million years.

I'm sorry to vent but this just isn't defensible. It's the very worst of AI. I'm not going to wish ill on Bun, but it just makes me sad that I spend so much effort, work so hard to do things right, and painstakingly review everything because it's not just me any more and I do have folks who depend on my code being reliable and secure. And meanwhile, Bun just gives a huge middle finger to 90k+ starred supporters not to mention the millions of users who didn't click on the star but rely on the library, by acting this disrespectfully and disgracefully towards their own users. How they didn't take one look at this and promptly revert and apologize is simply beyond me. Again, sorry to vent, but this made me irrationally mad.

reply
stavros 2 hours ago
I thought Rust treated undefined behaviour as a compiler bug? Does anyone know what's actually happening here?
reply
AlotOfReading 2 hours ago
"unsafe" is a promise to the compiler that you're going to ensure invariants that the compiler can't check. Rust only promises to eliminate UB if the invariants are held. You can still get UB by violating that promise, as this bug demonstrates.
reply
stavros 2 hours ago
But the title here says "in safe Rust", no? Is the unsafe code causing UB in safe code? I thought the unsafety couldn't "spread" like that in Rust.
reply
Xylakant 2 hours ago
That is not Rusts guarantee. The guarantee is that safe rust cannot in itself introduce UB - UB can only ever be introduced in unsafe blocks, but it can then materialize in safe code.
reply
stavros 2 hours ago
Ah OK, that makes sense, thanks.
reply
MereInterest 59 minutes ago
> I thought the unsafety couldn't "spread" like that in Rust.

The goal of a library is to provide the encapsulation such that the unsafety doesn't spread.

If undefined behavior occurs, the fault lies with whoever wrote `unsafe { ... }` in the body of a function. If I write "unsafe" in order to call an unsafe library function, and I don't meet the library function's pre-requisites, then it's my fault. If the library internally writes "unsafe" in order while providing a safe wrapper, and I never actually wrote `unsafe { ... }`. If neither I nor the library wrote `unsafe { ... }`, then it is the fault of the compiler.

Using "in safe Rust" means that `unsafe` doesn't occur either in the user code nor in the library. In this context, since we've heard how many uses of `unsafe { ... }` exist in the Bun rewrite, I'd read "in safe Rust" to mean "without calling any functions marked as unsafe".

reply
muvlon 2 hours ago
It can spread into safe code when you build an incorrect "safe" abstraction around unsafe code. Which the Bun Rust port apparently has.
reply
krona 2 hours ago
I can't tell if you're trolling but `unsafe { crash() }` is safe from the compiler's perspective. Otherwise you wouldn't be able to achieve anything in 'safe' rust, even print to stdout.
reply
flomo 35 minutes ago
I think its a good question, just because the whole UB thing is such an ideological shibboleth.

Maybe its better to think about this in the reverse, where C and C++ has 'defined behavior', but unsafe rust intentionally does not, its just whatever the complier and platform lets you get away with. Ultimately its still just a computer which stores values in memory and jumps to subroutines.

reply
dralley 2 hours ago
If you use unsafe improperly, it is possible to encounter UB in "safe" code which relies on the unsafe code being correct.
reply
bfeynman 2 hours ago
it's more straightforward to write safe rust when rust owns everything, In real world you often are interfacing with underlying libs or systems etc, which you need to treat as invariants but also handle yousrelf manually to make guarantees to compiler. unsafe exists in tons of codebases it's just you have to make sure you encapsulate it properly, which is what this bug is.
reply
chiffaa 2 hours ago
Unsafe code can break certain invariants of Rust, as `unsafe` is just a compiler "hold my beer" flag, which is why you're meant to do safety checks in your safe interface around unsafe code. If the unsafe code is wrapped in a way that does no guarding (or does something stupid in general), it is technically marked safe (because you said "rustc, hold my beer" as `unsafe` is also a contract) despite actually being unsafe
reply
repelsteeltje 2 hours ago
UB != unsafe
reply
jcranmer 33 minutes ago
Rust has lots of undefined behavior, in general a broadly similar set to that which exists in C. What Rust does that is different is that to trigger undefined behavior, you need to execute unsafe code. (This isn't the same as saying that you have to be in unsafe code--you can violate a precondition in unsafe code and have the UB itself trigger in safe code).
reply
stavros 23 minutes ago
That's a good explanation, thank you.
reply
repelsteeltje 2 hours ago
I'm sure there have been attempts at defining a language that has no UB, but afaik all meaningful languages have UB in some dark corner or enumerated explicitly. For example, Java thread execution order is UB.
reply
aw1621107 59 minutes ago
> For example, Java thread execution order is UB.

In this context "UB" means something different than how you're using it. The UB being mentioned here is the "nasal demons" form, i.e., programs which contain undefined behavior have no defined meaning according to the language semantics.

What you're talking about is probably better described in this context as "unspecified behavior", which is behavior that the language standard does not mandate but does not render programs meaningless. For example, IIRC in C++ the order in which g(), h(), and i() are evaluated in f(g(), h(), and i()) is unspecified - an implementation can pick any order, and the order doesn't have to be consistent, but no matter the order the program is valid (approximately speaking).

reply
repelsteeltje 46 minutes ago
Great example.

So this "unspecified behavior" might turn into the more nasal demon type when g(), h() and i() share mutable state and assume some particular sequential order of execution. No?

reply
quikoa 2 hours ago
It is only allowed in unsafe blocks. As long as the unsafe blocks are few and well understood then Rust programmers can contain this to a small well defined portion of a program.
reply
stouset 2 hours ago
Safe Rust does.

Unsafe Rust allows you to tell the compiler “hold my beer”. It’s a concession to the reality that the normal restrictions of Rust disallow some semantically valid programs that you might otherwise want to write. The safeguards work great in most cases, but in some they’re overly restrictive.

In practice, the overwhelming majority of code is able to be written in safe Rust and the compiler can have your back. The majority of the rest is for performance reasons, interacting with external functions like C libraries over FFI, or expressing semantics that safe Rust struggles with (e.g., circular references).

reply
stavros 2 hours ago
OK but the title says "in safe Rust". Am I misunderstanding something? All the replies here are saying how it's allowed in unsafe Rust, which is not what the title says.
reply
ndiddy 2 hours ago
If code in an unsafe block triggers undefined behavior, then the assumptions the compiler makes regarding safety will no longer be true, and purely safe code (code with no unsafe blocks) is no longer guaranteed to be safe. This is what's happening in the example the person on Github wrote in the issue.
reply
weinzierl 16 minutes ago
Exactly and "[...]and purely safe code (code with no unsafe blocks) is no longer guaranteed to be safe" hits the nail on the head.

I take issue with the phrasing of OP's title: "allows for UB in safe rust". AFAIK there are compiler bugs that allow UB in safe Rust, but this is not what is happening here. We have UB in an unsafe block (which is to be expected) which enables an issue outside in safe code. What is your opinion? Is calling this "UB in safe Rust" justified? I don't think so?

reply
rcxdude 53 minutes ago
Unsafe blocks are you saying to the compiler 'trust me bro, I know this is safe'. But often that relies on some property of the code being true in order for it to actually be safe. Generally speaking, the expectation in rust is that you either encapsulate the code that enforces whatever property you are relying on behind a safe interface, so that it's not possible for other code to use it unsafely, or that you mark the interface itself unsafe so that it's obvious that the code using that interface needs to maintain that property itself. Rust code that doesn't do this will generally be considered buggy by most rust programmers (e.g. if you find a use of safe interfaces in the stdlib that causes a memory safety violation, then you should file a ticket with the rust team), but this is essentially only a social convention of where the blame lies for a bug, not something that compiler itself can enforce (and, for example, you can violate memory safety in rust with only safe std interface by abusing OS interfaces like /proc/self/mem but this is something that most people don't think can be reasonably fixed). The main reason that rust as a language is better in this regard is that it gives much better tools for being able to express that safe interface without giving up performance and that it has the means to mark and encapsulate this safe/unsafe distinction.

Here's some links on this topic which have some examples:

https://doc.rust-lang.org/nomicon/working-with-unsafe.html https://www.ralfj.de/blog/2016/01/09/the-scope-of-unsafe.htm...

reply
ViewTrick1002 2 hours ago
They are using unsafe since large portions of Bun is interfacing with other unsafe codebases. Together with a "1:1" rewrite from Zig to Rust.

And it's not like Bun when written in Zig has been a beacon of stability either. It has been segfaults all over the place.

reply
jnwatson 2 hours ago
"Port of large memory unsafe codebase has a memory safety bug, news at 11."

I don't see what the big deal is here.

reply
RGJorge 2 hours ago
[flagged]
reply
Jcampuzano2 2 hours ago
So many people are fundamentally misunderstanding everything about this rewrite.

In fact using the word "rewrite" itself is pretty inaccurate.

As has been mentioned the goal was a port so they "could" eventually rewrite most of it to be idiomatic rust. The main benefit of this now is the compiler and being able to use these tools to fix issues that were already being hidden when it was in zig.

If you go into this codebase expecting to see idiomatic rust and get angry when it's not there, you are going in with the entirely incorrect attitude.

It's understandable how people see it as AI slop or whatever given the division among developers at the moment. But please see it for what it is instead of just jumping to conclusions.

reply
gipp 2 hours ago
> As has been mentioned the goal was a port so they "could" eventually rewrite most of it to be idiomatic rust.

They may have said that, but quite clearly the value they actually get out of it is getting the headline "AI reimplements complex, broadly used software in 2 weeks, but makes it way better because it's rust now" in front of a million people's eyes, only 1% of whom will ever find out it was mostly fluff

reply
Jcampuzano2 58 minutes ago
> quite clearly the value they actually get out of it is getting the headline

This is entirely disingenuous. Jarred has already made it clear what value they get out of moving off of Zig. Yes they used AI heavily to attempt this goal but I don't see what the big issue is. They haven't even released it yet and Anthropic themselves have said 0 about this.

The "headlines" thus far are really just people completely uninvolved with Bun and with all to gain by perpetrating "AI BAD".

My honest take: the big issue isn't "what if it goes wrong" its the fear that a migration of this size works out of the box and being done almost entirely by AI.

reply