RUST CODE AUDIT

Independent audits for serious Rust systems

Rillence reviews Rust codebases for memory safety assumptions, unsafe boundaries, concurrency faults, protocol correctness, and production reliability before they reach users.

Rust Native Review
Unsafe Boundary Analysis
Async Concurrency Checks
Report Actionable Findings
AUDIT CAPABILITIES

Security review grounded in how Rust systems fail in production

We inspect the code paths where compiler guarantees end: unsafe blocks, FFI, async cancellation, shared state, serialization, cryptography, and deployment assumptions.

01

Unsafe Code Review

Validate invariants around raw pointers, lifetimes, aliasing, custom allocators, FFI, transmute usage, and unchecked assumptions.

02

Concurrency & Async

Find deadlocks, cancellation hazards, race-prone state machines, backpressure gaps, lock ordering issues, and task lifecycle leaks.

03

Protocol Correctness

Check parsers, state transitions, consensus or settlement logic, signature validation, replay protection, and edge-case handling.

04

Dependency Risk

Review crate exposure, feature flags, supply-chain assumptions, unsafe transitive dependencies, build scripts, and vendored code.

05

Performance Hazards

Identify unbounded allocations, accidental copies, blocking work in async paths, panic surfaces, and denial-of-service vectors.

06

Operational Readiness

Assess observability, failure recovery, configuration handling, secrets exposure, upgrade paths, and incident response hooks.

AUDIT PROGRAMS

Focused reviews for the parts of your Rust stack that carry real risk

Engagements are scoped around concrete code, threat models, and release timelines. Each audit ends with reproducible findings, severity ratings, and remediation guidance.

Audit 01

Pre-Launch Rust Audit

A release-focused review of application logic, unsafe boundaries, async behavior, error handling, and dependency exposure before production launch.

Audit 02

Unsafe & FFI Audit

A deep review of unsafe Rust, C/C++ interop, raw memory access, ABI assumptions, pointer ownership, and soundness invariants.

Audit 03

Crypto & Protocol Audit

Review cryptographic usage, serialization formats, verification flows, replay resistance, parser behavior, and consensus-sensitive state transitions.

Audit 04

Performance & DoS Audit

Find resource exhaustion paths, algorithmic complexity traps, unbounded queues, blocking async work, panic surfaces, and production bottlenecks.

HOW WE WORK

Clear findings, reproducible evidence, practical fixes

The audit is designed for engineering teams that need more than a checklist. We trace behavior through the codebase and give fixes your team can implement.

Scope

Threat Model First

We define assets, trust boundaries, attacker capabilities, deployment assumptions, and the code paths that deserve the most attention.

Review

Manual Code Analysis

Automated tooling supports the work, but the core review is manual: invariants, state machines, error paths, and real exploitability.

Evidence

Reproducible Findings

Findings include affected code, impact, conditions, proof or reasoning, remediation options, and severity calibrated to your system.

Fixes

Remediation Review

After fixes land, we review patches and distinguish resolved risks from remaining assumptions or accepted tradeoffs.

Delivery

Engineer-Ready Report

The final report is structured for maintainers: concise executive summary, prioritized issues, and implementation-level guidance.

Support

Direct Technical Calls

We discuss architecture questions, ambiguous risks, and remediation tradeoffs directly with the engineers who own the code.

REQUEST AN AUDIT

Shipping Rust that needs a second set of eyes?

Send the repository scope, release timeline, and the parts of the system that worry you most. We will propose a focused audit plan.