creusot VS unsafe-code-guidelines

Compare creusot vs unsafe-code-guidelines and see what are their differences.

creusot

Creusot helps you prove your code is correct in an automated fashion. [Moved to: https://github.com/creusot-rs/creusot] (by xldenis)

unsafe-code-guidelines

Forum for discussion about what unsafe code can and can't do (by rust-lang)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
creusot unsafe-code-guidelines
15 74
868 641
- 1.4%
9.6 6.9
3 months ago about 2 months ago
Rust
GNU Lesser General Public License v3.0 only Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

creusot

Posts with mentions or reviews of creusot. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-05-31.
  • Conditioonal Compilation across Crates?
    1 project | /r/rust | 4 Jul 2023
    However, it seems that C is not "notified" whether --cfg thing is set, only the main crate being built is. Regardless of this flag, the dummy macro is always chosen. Am I doing something wrong? It should work; the Creusot project is doing something similar.
  • Kani 0.29.0 has been released!
    2 projects | /r/rust | 31 May 2023
    I believe https://github.com/xldenis/creusot is more similar in that it also uses proofs to prove rust code correct.
  • Prop v0.42 released! Don't panic! The answer is... support for dependent types :)
    5 projects | /r/rust | 18 Jan 2023
    Wow that sounds really cool! I'm not an expert but does that mean that one day you could implement dependend types or refinement types in Rust as a crate ? I currently only know of tools like: Flux Creusot Kani Prusti
  • Linus Torvalds: Rust will go into Linux 6.1
    12 projects | /r/programming | 26 Sep 2022
    Easy reasoning does not end on memory safety. For example, deductive verification of Rust code is possible exactly because there's no reference aliasing in safe Rust
  • A personal list of Rust grievances
    11 projects | news.ycombinator.com | 12 Sep 2022
    > No support for using something like separation logic within Rust itself to verify that unsafe code upholds the invariants that the safe language expects.

    I think this is something we might see in the future. There are a lot of formal methods people who are interested in rust. Creusot in particular is pretty close to doing this - at least for simpler invariants

    https://github.com/xldenis/creusot

  • Whiley, a language with statically checked pre and post conditions, releases its 0.6.1 version and portions implemented in Rust
    1 project | /r/rust | 1 Jul 2022
    Seems similar in principle to cruesot except as another language instead of as a layer on-top of rust.
  • What it feels like when Rust saves your bacon
    2 projects | news.ycombinator.com | 24 Jun 2022
    You often encounter this entire thread of rhetoric when someone wants to put a diversion into the central argument, yeah but it doesn't ____.

    But Rust does do that, match exhaustiveness, forcing the handling of errors and the type system enables things like CreuSAT [1] using creusot [2]

    [1] https://news.ycombinator.com/item?id=31780128

    [2] https://github.com/xldenis/creusot

    > Creusot works by translating Rust code to WhyML, the verification and specification language of Why3. Users can then leverage the full power of Why3 to (semi)-automatically discharge the verification conditions!

    Units of Measure, https://github.com/iliekturtles/uom

    The base properties of the language enable things that can never be done in C++.

  • Creusot: Deductive Verification of Rust
    1 project | news.ycombinator.com | 17 Jun 2022
  • What Is Rust's Unsafe?
    5 projects | news.ycombinator.com | 10 Apr 2022
    > I’ve been working on a tool: https://github.com/xldenis/creusot to put this into practice

    Note that there are other tools trying to deal with formal statements about Rust code. AIUI, Rust developers are working on forming a proper working group for pursuing these issues. We might get a RFC-standardized way of expressing formal/logical conditions about Rust code, which would be a meaningful first step towards supporting proof-carrying code within Rust.

  • AdaCore and Ferrous Systems Joining Forces to Support Rust
    14 projects | news.ycombinator.com | 2 Feb 2022
    This is exciting! I've met with people from AdaCore and Ferrous systems (individually) several times and they're all serious, competent and motivated.

    I'm curious what kinds of software they want to (eventually) verify, my PhD thesis is developing a verification tool for Rust (https://github.com/xldenis/creusot) and I'm always on the look out for case studies to push me forward.

    The road to formally verified Rust is still long but in my unbiased opinion looking quite bright, especially compared to other languages like C.

unsafe-code-guidelines

Posts with mentions or reviews of unsafe-code-guidelines. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-16.
  • Passing nothing is surprisingly difficult
    2 projects | news.ycombinator.com | 16 Jan 2024
    Useful context on the Rust side is this issue [1]. It sounds like some of the author's concerns are addressed already.

    [1]: https://github.com/rust-lang/unsafe-code-guidelines/issues/4...

  • Blog Post: Non-Send Futures When?
    2 projects | /r/rust | 10 Dec 2023
    Is this captured by one of the known soundness conflicts? If not then should consider adding it to the list.
  • Are crates like vcell and volatile cell still unsound?
    1 project | /r/rust | 5 Jun 2023
  • Question: Are there things for Unsafe Rust learn from Zig?
    2 projects | /r/rust | 1 Jun 2023
    There are some competing proposals for different memory models. Stacked borrows is the current proposal, but there are more work in the approproate WG.
  • Let's thank who have helped us in the Rust Community together!
    9 projects | /r/rust | 28 May 2023
    Thank you /u/RalfJung for bringing formal methods to Rust, both through models like Stacked Borrows, by developing miri, and by working on unsafe-code-guidelines which aims to specify exactly what is and isn't allowed in unsafe code (surprisingly, it's an open question as 2023!)
  • Questions about ownership rule
    2 projects | /r/rust | 23 May 2023
  • Noob Here: Why doesn't this work?
    1 project | /r/rust | 16 Apr 2023
    You could imagine some way to make this safe for example automatically convert &'short &'long mut T to &'short &'short T, but it's non-trivial to prove they are safe at all, not to mention ensuring this is correctly implemented in the compiler. If you're interested there's also a discussion on whether the opposite (& & T to & &mut T) is sound here.
  • When Zig is safer and faster than (unsafe) Rust
    3 projects | /r/rust | 7 Mar 2023
    Agreed! MIRI is so good, it still feels like magic to me. It also comforts me that the Rust team takes improving unsafe semantics seriously, with the past Unsafe Code Guidelines WG and today's operational semantics team (t-opsem).
  • Safety and Soundness in Rust
    5 projects | news.ycombinator.com | 5 Mar 2023
    I think there are some aspects of this rule that are still undecided. See for example:

    - https://github.com/rust-lang/unsafe-code-guidelines/issues/8...

    - https://github.com/rust-lang/miri/issues/2732

  • I wanna be a crab.
    16 projects | /r/rust | 27 Feb 2023
    C is much better specified than unsafe Rust. Some things are just not worked out yet in Rust. This may sometimes even bite very experienced devs, such as this issue with Box's aliasing semantics, which tripped up the author of left-right.

What are some alternatives?

When comparing creusot and unsafe-code-guidelines you can also consider the following projects:

misra-rust - An investigation into what adhering to each MISRA-C rule looks like in Rust. The intention is to decipher how much we "get for free" from the Rust compiler.

tokio - A runtime for writing reliable asynchronous applications with Rust. Provides I/O, networking, scheduling, timers, ...

l4v - seL4 specification and proofs

rust - Empowering everyone to build reliable and efficient software.

Daikon - Dynamic detection of likely invariants

rfcs - RFCs for changes to Rust

agda-stdlib - The Agda standard library

x11rb - X11 bindings for the rust programming language, similar to xcb being the X11 C bindings

hacspec - Please see https://github.com/hacspec/hax

bevy - A refreshingly simple data-driven game engine built in Rust

CreuSAT - CreuSAT - A formally verified SAT solver written in Rust and verified with Creusot.

miri - An interpreter for Rust's mid-level intermediate representation