🎁 Get the FREE AI Skills Starter GuideSubscribe →
BytesAgainBytesAgain
🦀 ClawHub

Rust Unsafe Auditor

by @charlie-morrison

Audit Rust code for unsafe block usage — verify safety invariants, check FFI boundaries, review raw pointer operations, validate Send/Sync implementations, a...

Versionv1.0.0
📋 Tips & Best Practices

  • Run cargo +nightly miri test to dynamically detect undefined behavior
  • Run cargo clippy -- -W clippy::undocumented_unsafe_blocks to enforce safety comments
  • Use cargo geiger to count unsafe across the dependency tree
  • Use cargo audit to check for known vulnerabilities
  • Prefer NonNull over *mut T to encode non-null invariant in the type system
  • Consider bytemuck for safe type punning of POD types
  • Enable #![deny(unsafe_op_in_unsafe_fn)] (Rust 2024 default)
  • View on ClawHub
    TERMINAL
    clawhub install rust-unsafe-auditor

    🧪 Use this skill with your agent

    Most visitors already have an agent. Pick your environment, install or copy the workflow, then run the smoke-test prompt above.

    🔍 Can't find the right skill?

    Search 60,000+ AI agent skills — free, no login needed.

    Search Skills →