⬡
Ferrous Bridge
Papers
GitHub
☰ Contents
Contents
1.1 The problem
1.2 The thesis
1.3 Roadmap
2.1 Part I — The C Language as a Translation Source
2.2 Part II — Idiomatic Safe Rust as a Translation Target
2.3 Part III — Automated C → Rust Transpiling
2.4 Cross-cutting themes
3.1 Agents as morphisms; artifacts as types
3.2 The ten agents and the workflow DAG
3.3 The DAG as a tikz-cd diagram
3.4 Topological constraints
4.1 Refinement, observation, and notation
4.2 Rung 1: ⊑compile — compilation safety
4.3 Rung 2: ⊑mem — memory safety under Stacked Borrows
4.4 Rung 3: ⊑behav — behavioural safety via differential fuzzing
4.5 Rung 4: ⊑conc — concurrency safety
4.6 Rung 5: ⊑ref — refinement safety via Kani
4.7 Rung 6: ⊑abi — API/ABI parity
4.8 The ladder as a chain
5.1 Statement
5.2 Proof sketch
5.3 Corollaries
6.1 The protobuf schemas
6.2 The supervisor’s schema-validation step
6.3 The orchestration–Rust analogy
7.1 The schedule, agent-tagged
7.2 The critical Day-7 verification fan-out
7.3 Cost trajectory
8.1 What does not change
8.2 What does change
8.3 New refinement obligations
8.4 Schedule extrapolation
8.5 The DAG re-instantiated
8.6 Limits of the streaming-parser archetype
9.1 Bounded human-review escalation
9.2 Training-data harvest from accepted artifacts
9.3 Fine-tuned-model feedback loop
9.4 Cost trajectory
10.1 Academic c2rust line
10.2 Industry: Galois, Immunant, Microsoft
10.3 Prossimo / Trifecta shipped Rust replacements
A.1 Supervisor core
A.2 Artifact schemas
A.3 Pipeline runtime
A.4 Telemetry
A.5 End-to-end demo
A.6 Task dependency DAG
A.7 Two-week MVP Gantt
Synthesis
Ferrous Bridge: A C → Rust Automated Agent Orchestration Pipeline with Type Checks and Safety Guarantees
37 pages
cs.PL
DOI: 2026.04.synthesis
← Previous
Automated C → Rust Transpiling: From c2rust's Raw Lift to Safe, Idiomatic Rust via the Safety Ladder
⤓ PDF