generated from 11ty/eleventy-base-blog
-
Notifications
You must be signed in to change notification settings - Fork 33
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* Added 1 file via CloudCannon. * Updated 1 file via CloudCannon. * Updated 1 file via CloudCannon. --------- Co-authored-by: Gracie Gregory <[email protected]> Co-authored-by: cloudcannon[bot] <111820006+cloudcannon[bot]@users.noreply.github.com> Co-authored-by: CloudCannon <[email protected]>
- Loading branch information
1 parent
900bace
commit 5f72a48
Showing
1 changed file
with
43 additions
and
0 deletions.
There are no files selected for viewing
43 changes: 43 additions & 0 deletions
43
...oundation-collaborates-with-aws-initiative-to-verify-rust-standard-libraries.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
--- | ||
title: >- | ||
Rust Foundation Collaborates With AWS Initiative to Verify Rust Standard | ||
Libraries | ||
byline: Rust Foundation Team | ||
description: >- | ||
The Rust Foundation is excited to support a new contest from AWS that | ||
endeavors to crowd-source the verification of the Rust standard libraries. | ||
date: 2024-11-20T15:00:00Z | ||
tags: | ||
- foundation | ||
index: false | ||
layout: layouts/news.njk | ||
--- | ||
Today, Amazon Web Services (AWS) announced a collaborative initiative aimed at verifying the safety of the Rust standard libraries. The Rust Foundation has reviewed the plans behind this effort and is excited to serve as host! | ||
|
||
Although the Rust Programming language is designed to be both safe and efficient, these assurances do not apply to unsafe constructs. Currently, the Rust standard library contains approximately 35,000 functions, including 7,500 marked as unsafe, necessitating a focused effort to ensure their reliability and security. | ||
|
||
This initiative will include a series of challenges that focus on verifying memory safety and a subset of undefined behaviors in the Rust standard library. Participants can contribute by specifying contracts, verifying library components, or developing new verification tools. AWS’ goal is to contribute to an ecosystem where verification becomes an integral part of the Rust language's continuous integration process. There is a financial award tied to each challenge, awarded upon its successful completion. | ||
|
||
Other key notes: | ||
|
||
* Participants can contribute by specifying contracts, verifying library components, or developing new verification tools. | ||
* The challenge specifies success criteria that must be met for the solution to be reviewed and merged into the forked repository CI pipeline. | ||
* The effort is tool agnostic | ||
* The repository provides templates for introducing new challenges, new tools, and instructions on how to submit solutions to challenges. | ||
* AWS is supporting this effort and has already seen engagement from 30+ students, academics, and researchers. | ||
|
||
### The Rust Foundation’s Role | ||
|
||
Although AWS is a Platinum Member of the Rust Foundation, we have opted to host the challenge purely out of our shared belief in the safety and reliability of Rust libraries and our desire to have as much insight as possible into important efforts like this. | ||
|
||
The challenge rewards committee is responsible for reviewing activity and dispensing rewards. | ||
|
||
### Get Involved! | ||
|
||
AWS invites you to participate by solving challenges, introducing *new* challenges or tools, and/or helping review and refine the current processes. | ||
|
||
Challenge announcement from AWS | ||
|
||
Associated GitHub Repository: [https://github.com/model-checking/verify-rust-std](https://github.com/model-checking/verify-rust-std) | ||
|
||
|