RustBoot
rustBoot is a standalone bootloader written entirely in `Rust`, designed to run on anything from a microcontroller to a system on chip. It can be used to boot into bare-metal firmware or Linux.
Install / Use
/learn @nihalpasham/RustBootREADME
rustBoot
rustBoot is a standalone bootloader, written entirely in Rust, designed to run on anything from a microcontroller to a system on chip. It can be used to boot into bare-metal firmware or Linux.

Why rustBoot?
rustBoot aims to offer an OS and micro-architecture agnostic (i.e. highly portable) secure bootloader which is standards-compatible and easy to integrate into existing embedded software projects.

Features currently supported:
- [x] support for
ARM Cortex-M, Cortex-Amicro-architectures - [x] support for multi-slot partitioning of microcontroller flash memory. This allows us to implement the
boot/updateapproach for bare-metalfirmware updates. - [x] support for
Aarch64 linuxbooting - [x] elliptic curve cryptography for integrity and authenticity verification using
RustCryptocrates - [x] a tiny hardware abstraction layer for non-volatile memory (i.e. flash) access.
- [x] anti-rollback protection via version numbering.
- [x] a fully memory safe core-bootloader implementation with safe parsers and firmware-update logic.
- [x] power-interruptible firmware updates along with the assurance of fall-back availability.
- [x] a
signing utilityto sign bare-metal firmware and fit-image(s), written in pure rust.
Features planned:
- [ ] support for external flash devices (ex: SPI flash) and serial/console logging interfaces.
- [ ] support for
ARM TrustZone-M and Aand certifiedsecure hardware elements- microchip ATECC608a, NXP SE050, STSAFE-100 - [ ] support for secure, distributed and efficient
firmware transportover ipfs.
Documentation:
You can read the book for <a href="https://nihalpasham.github.io/rustBoot-book/index.html" target="_blank">free online.</a>.
Note:
rustBootand thebookare still in development (i.e. a work in progress).
Acknowledgment:
rustBoot exists as we could not find a suitable (open-source) option that meets our security goals. It is the result of an exhaustive evaluation of 'pretty much' the entire embedded-bootloader landscape.
Having said that, it does take inspiration from similar projects (such as u-boot, zephyr, mcuboot, coreboot, wolfBoot etc). However, the key differentiator is security-above-all-else. To that extent, its built entirely in rust, takes full advantage of rust's memory safety guarantees while leveraging safer parsing libraries, compile-time state-transition checks coupled with (safe) community sourced rust-crates (such as boards, HALs drivers etc.)
Support:
For questions, issues, feature requests, and other changes, please file an issue in the github project.
License:
rustBoot is licensed under
- MIT license (LICENSE-MIT or http://opensource.org/licenses/MIT)
Contributing:
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the MIT license, shall be licensed as above, without any additional terms or conditions.
Related Skills
healthcheck
347.2kHost security hardening and risk-tolerance configuration for OpenClaw deployments
himalaya
347.2kCLI to manage emails via IMAP/SMTP. Use `himalaya` to list, read, write, reply, forward, search, and organize emails from the terminal. Supports multiple accounts and message composition with MML (MIME Meta Language).
taskflow
347.2kname: taskflow description: Use when work should span one or more detached tasks but still behave like one job with a single owner context. TaskFlow is the durable flow substrate under authoring layer
prose
347.2kOpenProse VM skill pack. Activate on any `prose` command, .prose files, or OpenProse mentions; orchestrates multi-agent workflows.
