Xr0 Makes C Safer than Rust
C But Safe
Xr0 Makes C Safer than Rust
There is a practical way to guarantee the safety of C programs at compile time,
in the sense of no use-after-frees, no double frees, no buffer out-of-bounds
reads/writes, no null pointer dereferences, no uses of uninitialised memory, no
arithmetic overflows/underflows and, more generally, no undefined behaviour.
The latest version of Xr0 is an empirical demonstration of the
validity of this method.
Though very rough around the edges, Xr0 can already elimina...
Read more at xr0.dev