SkillAgentSearch skills...

Verifast

Research prototype tool for modular formal verification of C, Rust and Java programs

Install / Use

/learn @verifast/Verifast
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

CI DOI

[Quick intros] [Proofs done] [Binaries] [User interfaces] [Compiling] [Documentation] [Getting help] [Acknowledgements] [Mailing lists] [Third-party resources]

VeriFast

By Bart Jacobs*, Jan Smans*, and Frank Piessens*, with contributions by Pieter Agten*, Cedric Cuypers*, Lieven Desmet*, Niels Mommen*, Jan Tobias Muehlberg*, Willem Penninckx*, Pieter Philippaerts*, Nima Rahimi Foroushaani*, Amin Timany*, Thomas Van Eyck*, Gijs Vanspauwen*, Frédéric Vogels*, and external contributors

* imec-DistriNet research group, Department of Computer Science, KU Leuven - University of Leuven, Belgium

VeriFast is a research prototype of a tool for modular formal verification of correctness properties of single-threaded and multithreaded C, Rust and Java programs annotated with preconditions and postconditions written in separation logic. To express rich specifications, the programmer can define inductive datatypes, primitive recursive pure functions over these datatypes, and abstract separation logic predicates. To verify these rich specifications, the programmer can write lemma functions, i.e., functions that serve only as proofs that their precondition implies their postcondition. The verifier checks that lemma functions terminate and do not have side-effects. Since neither VeriFast itself nor the underlying SMT solver need to do any significant search, verification time is predictable and low.

The VeriFast source code and binaries are released under the MIT license.

Quick intros

Proofs done

Some of the more notable proofs done with VeriFast (with caveats) include:

Binaries

Within an hour after each push to the master branch, binary packages become available here.

These "nightly" builds are very stable and are recommended. Still, named releases are available here. (An archive of older named releases is here.)

Simply extract the files from the archive to any location in your filesystem. All files in the archive are in a directory named verifast-COMMIT where COMMIT describes the Git commit. For example, on Linux:

tar xzf ~/Downloads/verifast-nightly.tar.gz
cd verifast-<TAB>  # Press Tab to autocomplete
bin/vfide examples/java/termination/Stack.jarsrc  # Launch the VeriFast IDE with the specified example
./test.sh  # Run the test suite (verifies all examples)

Note (macOS): To avoid GateKeeper issues, before opening the downloaded archive, remove the com.apple.quarantine attribute by running

sudo xattr -d com.apple.quarantine ~/Downloads/verifast-nightly-osx.tar.gz

Supply chain security: The CI workflow creates GitHub Artifact Attestations for these binaries, so that you can verify that they were generated by a GitHub Actions workflow triggered by a push to this repository. To do so, install the GitHub CLI and run

gh attestation verify verifast-21.04-352-gbeb57a82-macos.tar.gz --repo verifast/verifast

To check for a particular commit SHA, run

[ "$(gh attestation verify verifast-21.04-352-gbeb57a82-macos.tar.gz --repo verifast/verifast --format json --jq '.[0].verificationResult.signature.certificate.sourceRepositoryDigest')" = "beb57a820915409f71dbc2a802985e291e60e12d" ]

User interfaces

We offer the following user interfaces:

  • The VeriFast IDE (at bin/vfide in the distribution)
  • The VeriFast VS Code Extension
  • The VeriFast command-line tool (at bin/verifast in the distribution)

Compiling

Documentation

Getting help

The maintainer (and, perhaps, other VeriFast users and enthusiasts as well) can be reached for informal chat in the VeriFast Zulip chatroom.

Acknowledgements

Dependencies

We gratefully acknowledge the authors and contributors of the following software packages.

Bits that we ship in our binary packages

  • OCaml
  • OCaml-Num
  • Lablgtk
  • GTK+ and its dependencies (including GLib, Cairo, Pango, ATK, gdk-pixbuf, gettext, fontconfig, freetype, expat, libpng, zlib, Harfbuzz, and Graphite)
  • GtkSourceView
  • The excellent Z3 theorem prover by Leonardo de Moura and Nikolaj Bjorner at Microsoft Research, and co-authors

Software used at build time

  • findlib, ocamlbuild, camlp4, valac
  • Cygwin, Homebrew, Debian, Ubuntu
  • The usual infrastructure: GNU/Linux, GNU make, gcc, etc.

Infrastructure

We gratefully acknowledge the following infrastructure providers.

  • GitHub
  • The Zulip team chat app

Funding

This work is supported in part by the Flemish Research Fund (FWO-Vlaanderen), by the EU FP7 projects SecureChange, STANCE, ADVENT, and VESSEDIA, by Microsoft Research Cambridge as part of the Verified Software Initiative

Related Skills

View on GitHub
GitHub Stars481
CategoryEducation
Updated1h ago
Forks71

Languages

Rust

Security Score

80/100

Audited on Mar 31, 2026

No findings