Because it was written in C, libxml2's CVE history has been dominated by use-after-free, buffer overflows, double frees, and type confusion. xmloxide is written in pure Rust, so these entire vulnerability classes are eliminated at compile time.
Only if it doesn’t use any unsafe code, which I don’t think is the case here.
Only if it doesn’t use any unsafe code, which I don’t think is the case here.