X41 releases the audit report of Rust-VMM
X41 did not discover any vulnerabilities during the audit and only identified
issues that may pose a security risk due to code changes in the future. In
contrary, X41 found that the security posture of Rust-VMM is exemplary. The
issue that was reported directly during the audit was taken seriously despite
the lack of direct impact and a fix was committed within a week. The source code
is well commented, and the developer team understands minute details of Rust’s
memory safety model.
However, using Rust-VMM does not necessarily shield an upstream user of the
framework from certain risks. The best example is the expandability of the
framework with custom virtio drivers, which run in the user space of the host
operating system. Often, these need to parse data provided by the guest
operating system virtio driver, which is inherently untrusted. Here classical
vulnerability patterns like time-of-check-time-of-use bugs or double-fetches
If you are interested in working with us on such projects in the future, remote or in-office, have a look at our jobs page!