Skip to content

Formal verification tool for Rust: check 100% of execution cases of your programs πŸ¦€ to make applications with no bugs! ✈️ πŸš€ βš•οΈ 🏦

License

Notifications You must be signed in to change notification settings

formal-land/coq-of-rust

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

logo coq-of-rust

Formal verification tool for Rust: check 100% of execution cases of your programs πŸ¦€ to make applications with no bugs! ✈️ πŸš€ βš•οΈ 🏦

Even if Rust's type system prevents many mistakes, including memory errors, the code is still not immune to vulnerabilities, such as unexpected panics or wrongly implemented business rules.

The way to go further is to mathematically prove that it is bug-free: this is named "formal verification" and what coq-of-rust proposes! This is the only way to ensure your code contains no bugs or vulnerabilities, even against state-level actors 🧚.

We propose formal verification as a service, including designing the specification and the proofs.

➑️ Get started 🦸 ⬅️

The development of coq-of-rust was mainly funded by theΒ Aleph Zero Foundation. We thank them for their support!

Table of Contents

Example

At the heart of coq-of-rust is the translation of Rust programs to the proof system Coq πŸ“. Once some Rust code is translated to Coq, it can then be verified using standard proof techniques.

Here is an example of a Rust function:

fn add_one(x: u32) -> u32 {
    x + 1
}

Running coq-of-rust, it translates in Coq to:

Definition add_one (Ο„ : list Ty.t) (Ξ± : list Value.t) : M :=
  match Ο„, Ξ± with
  | [], [ x ] =>
    ltac:(M.monadic
      (let x := M.alloc (| x |) in
      BinOp.Panic.add (| M.read (| x |), Value.Integer Integer.U32 1 |)))
  | _, _ => M.impossible
  end.

Functions such asΒ BinOp.Panic.add are part of the standard library for Rust in Coq that we provide. We can then express and verify specifications on the code in Coq.

Workflow

Here is the typical workflow of usage for coq-of-rust:

graph TB
    R[Rust code πŸ¦€] -- coq-of-rust --> T[Translated code πŸ“]
    T -- name resolutions --> L[Linked code πŸ“]
    L -- refinement --> S[Simulations πŸ“]
    S --> P
    SP[Specifications πŸ“] --> P[Proofs πŸ“]
    P -.-> X[100% reliable code! πŸ¦„]
Loading

We start by generating an automatic translation of the Rust we verify to Coq code with coq-of-rust. The translation is originally verbose. We go through two semi-automated refinement steps, links and simulations, that gradually make the code more amenable to formal verification.

Finally, we write the specifications and prove that our Rust program fulfills them with any possible user input πŸ”₯.

Examples of typical specifications are:

  • The code cannot panic.
  • This clever data structure is equivalent to its naive version, except for the execution time.
  • This new release, which introduces new endpoints and does a lot of refactoring, is fully backward-compatible with the previous version.
  • Data invariants are properly preserved.
  • The storage system is sound, as what goes in goes out (this generally amounts to state that the serialization/deserialization functions are inverse).
  • The implementation behaves as a special case of what the whitepaper describes once formally expressed.

With that in hand, you can virtually reduce your bugs and vulnerabilities to zero 🦸!

Rationale

Formal verification allows the prevention of all bugs in critical software.

The type system of Rust already offers strong guarantees to avoid bugs that exist in C or Python. We still need to write tests to verify the business rules or the absence of panic. Testing is incomplete as it cannot cover all execution cases.

With formal verification, we cover all cases (code 100% bug-free!). We replace the tests with mathematical reasoning on code. You can view it as an extension of the type system but without restrictions on the expressivity.

The tool coq-of-rust translates Rust programs to the battle-tested formal verification system Coq to make Rust programs 100% safeΒ πŸš€.

Prerequisites

Installation and User Guide

The build tutorial provides detailed instructions on building and installing coq-of-rust, while the user tutorial provides an introduction to the coq-of-rust command line interface and the list of supported options.

Language features

The translation works at the level of the THIR intermediate representation of Rust.

We support 99% of the Rust examples from the Rust Book by Examples. This includes:

  • basic control structures (likeΒ if andΒ match)
  • loops (while andΒ for)
  • references and mutability (& andΒ &mut)
  • closures
  • panics
  • user types (withΒ struct andΒ enum)
  • the definition of traits
  • the implementation keywordΒ impl for traits or user types

Contact

For formal verification services on your Rust code base, contact us at [email protected]. Formal verification can apply to smart contracts, database engines, or any critical Rust project. This provides the highest confidence level in the absence of bugs compared to other techniques, such as manual reviews or testing.

Alternative Projects

Here are other projects working on formal verification for Rust:

Contributing

This is all open-source software.

Open some pull requests or issues to contribute to this project. All contributions are welcome! This project is open-source under license AGPL for the Rust code (the translator) and MIT for the Coq libraries. There is a bit of code taken from the Creusot project to make the Cargo command coq-of-rust and run the translation in the same context as Cargo.

About

Formal verification tool for Rust: check 100% of execution cases of your programs πŸ¦€ to make applications with no bugs! ✈️ πŸš€ βš•οΈ 🏦

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

 

Packages

No packages published

Languages