# Security
At the moment, rust-analyzer assumes that all code is trusted. Here is a
**non-exhaustive** list of ways to make rust-analyzer execute arbitrary
code:
- proc macros and build scripts are executed by default
- `.cargo/config` can override `rustc` with an arbitrary executable
- `rust-toolchain.toml` can override `rustc` with an arbitrary
executable
- VS Code plugin reads configuration from project directory, and that
can be used to override paths to various executables, like `rustfmt`
or `rust-analyzer` itself.
- rust-analyzer’s syntax trees library uses a lot of `unsafe` and
hasn’t been properly audited for memory safety.