I think section in readme about bindings is better than folding bindings code in this repository (like with Java).
Related issue: #255
Bindings authors: @toxeus @xenog @wanderer @afk11 @ludbb @DavidEGrayson @wink @dpc
Directing people to things which may be insecure like that is just ’laundering’ when we know the note would just be ignored– it might be necessary but it’s not sufficient: Assuming one of the bindings is incorrect (or even malicious) listing it with a note would be a boobytrap and incompatible with our design principle of being hard to misuse.
Bindings should be subject to peer review by cryptographers; same as the extern C interface of libsecp256k1, since it’s functionally the same when used in different environments. The review will be easier when we finish documenting our design assumptions and objectives; since then the bindings could be checked against satisfying those properties.
@gmaxwell : People will just google “bitcoin bindings in X” or use search function in the package manager of the language of their choice etc.
IMO having a “big red warning” on the list here, and requiring projects listed in the list to have one in the README, is a win, as it has some chance of informing the potential users.
I think if you decide to add a list of ‘recommended’ bindings then there should be a clear list of review criteria the projects have to adhere to, and a list of tests that it has to pass in the bound language.
But to take the task of ‘vetting’ projects is quite a responsibility and I can understand if @gmaxwell and al aren’t willing to include that in their scope.
This may be better for a wiki article or such, with the appropriate warnings.
On the other hand, good bindings are important for adoption of the library. Putting the bar too high may result in people just ignoring advice, or rolling their own without cooperation and review of others.