Here are some other thoughts I have with respect to security/trust of the Rust ecosystem. What matters is liability. Why? Because you can put a monetary value to it. This is how we economically compare actions and outcomes.
What do I mean by this? Well, think of it this way, if I am building software to sell or give away, I want to minimize my liability for any unforeseen outcomes in either case. Part of the way this is mostly done in the software world is through licenses and EULA’s that specifically disclaim liability, warranties, or guarantees of any sort to the degree permitted by law. If I am in a situation where I am actually selling a product (or being contracted to provide work), I generally need to provide some sort of insurance for professional liability, product liability, etc. This insurance costs me different amounts depending on the amount of liability I want the insurance to protect me against versus the perceived risk the insurance company sees.
Now, insurance companies are really good at assessing risk. It’s what they do. It’s how they butter their bread so-to-speak. If I want to use open-source, closed-source, or self-written software components to build a solution, how is the insurance company to determine risk? They determine risk through audits of processes and procedures where those processes and procedures include certain standards of testing, documentation, security procedures, code auditing, etc., etc. The only way for an insurance company to get the assurance they want would be by having an insurance approved organization responsible for vetting/curating something like crates.io to whatever industry-approved standards would make them comfortable in assessing and valuing the risk.
For that reason, I think the discussion of these things has to move beyond specific technical issues and move more into the realm of what kind of “organization” needs to exist, how it would be funded, how it would be staffed, how it would coordinated and comply with industry approved standards and auditing processes approved and/or recognized by the insurance and auditing industries. Just talking about specific technical aspects of things like buffer over-flows, unsafe code guidelines, 2FA, crate signing, etc., while useful, won’t get you anywhere you need to be to have meaningful “trust” (meaning the insurance companies can assess and value the risk to their satisfaction).
These are just some thoughts I have on the issues.