ZERO CRITICAL | ZERO HIGH

Industrial-Grade Code Quality

19-layer extreme audit scanner. Targeting ANSSI/IGI-1300, Common Criteria EAL4+, DO-178C, and ISO 26262 compliance. Zero tolerance policy.

0
CRITICAL
0
HIGH
193
MEDIUM
29
LOW
19
AUDIT LAYERS

Compliance Standards

HDDS audit targets the most demanding certification standards in defense, aerospace, and automotive industries.

πŸ‡«πŸ‡·

ANSSI/IGI-1300

French Military Certification

πŸ›‘οΈ

Common Criteria

EAL4+ Security Level

✈️

DO-178C

Avionics Level B

πŸš—

ISO 26262

ASIL-D Automotive

πŸ“‹

MISRA-C++

2008 Guidelines

πŸ“‘

OMG DDS

RTPS v2.5 Spec

19 Audit Layers

Every commit passes through our extreme audit scanner. Zero tolerance for critical and high severity issues.

LAYER 1

Anti-Stub Enforcement

No TODO, FIXME, HACK, XXX, unimplemented!(), dbg!() in production code

LAYER 2

Type Safety Audit

Detect dangerous casts (as u8/u16/u32), transmute() forbidden

LAYER 3

Unsafe Code Audit

Every unsafe block requires SAFETY justification comment (ANSSI/IGI-1300)

LAYER 4

Complexity Analysis

McCabe cyclomatic ≀10, cognitive complexity ≀15, function ≀100 lines

LAYER 5

Panic/Unwrap Audit

No panic!() or .unwrap() in production - use expect() or ? operator

LAYER 6

Memory Patterns

Detect Box::leak, mem::forget, ManuallyDrop, static mut

LAYER 7

Dependency Audit

cargo-audit for CVEs, outdated deps check, dependency count monitoring

LAYER 8

Clippy Ultra-Hardened

ALL lints enabled: pedantic, nursery, cargo + indexing_slicing, empty_drop

LAYER 9

Documentation Coverage

All public items documented, unsafe fn requires # Safety section

LAYER 10

Concurrency Audit

Mutex poison handling, no global mutable state, thread join verification

LAYER 11

License Compliance

License headers, GPL contamination check

LAYER 12

Performance Antipatterns

collect().len() β†’ count(), no String allocation in loops

LAYER 13

RTPS/DDS Compliance

Endianness handling, CDR2 alignment, #[repr(C)] on wire structs

LAYER 14

Test Coverage

Minimum 90% coverage target, test function count monitoring

LAYER 15

Unsafe Budget (Geiger)

cargo-geiger unsafe code budget monitoring across all dependencies

LAYER 16

Swallowed Results

Detect '_ = expr;' patterns that ignore errors or results

LAYER 17

Unused Dependencies

cargo-udeps to detect unused crates in Cargo.toml

LAYER 18

Secrets Detection

Scan for hardcoded passwords, API keys, tokens in source

LAYER 19

Code Duplication

jscpd token-based analysis, max 7% duplication threshold

Quality Toolchain

Static Analysis

  • Clippy (ultra-hardened)
  • rust-code-analysis
  • cargo-geiger
  • ripgrep patterns

Security

  • cargo-audit (CVE)
  • Secrets scanner
  • Unsafe budget
  • Dependency tree

Coverage

  • cargo-tarpaulin
  • Test count tracking
  • Doc coverage
  • 90% minimum target

Code Quality

  • jscpd (duplication)
  • cargo-udeps
  • cargo-outdated
  • Complexity metrics

Quality Thresholds

MetricThresholdHDDS CurrentStatus
Cyclomatic Complexity≀ 10~8PASS
Cognitive Complexity≀ 15~12PASS
Function Length≀ 100 lines~60PASS
File Length≀ 800 lines~500PASS
Unsafe Blocks≀ 250~13EXCELLENT
Test Coverageβ‰₯ 90%~85%GOOD
Code Duplication≀ 7%~5%PASS
Critical Violations00PASS
High Violations00PASS

Runtime Sanitizers

Valgrind
Memory Leak Detector
0 bytes lost
PASS
ASan
AddressSanitizer
2171/2173 tests
PASS
TSan
ThreadSanitizer
0 data races
PASS
MSan
MemorySanitizer
0 uninit reads
PASS

Memory-safe and thread-safe validated by Valgrind + LLVM sanitizers (ASan, TSan, MSan)

Continuous Fuzzing

SPDP Parser
Discovery Protocol
2,054 corpus
0 crashes
SEDP Parser
Endpoint Discovery
3,939 corpus
0 crashes
Control Parser
RTPS Messages
517 corpus
0 crashes
XML Permissions
Security Config
6,383 corpus
0 crashes
IDL Parser
Code Generator
fuzz target
0 crashes
CDR2 Decoder
Serialization
fuzz target
0 crashes

cargo-fuzz (libFuzzer) - 6 fuzz targets, 0 crashes. Continuous fuzzing on all protocol parsers.

CDR2 Golden Vectors

42 binary reference vectors published for spec compliance verification. No other DDS vendor does this.

42
vectors
11
type categories
XCDR2
encoding
Deterministic
byte-stable

bool, char8, Option<T>, [T; N], BTreeMap<K,V> β€” all XCDR2 spec types covered, not just the easy ones.

// primitive_u32 golden vector (XCDR2 LE)
00000000  00 0a 00 00  2a 00 00 00                   |....*...|
//        encap hdr    u32 = 42 (little-endian)

DDS Conformance Matrix

Cross-vendor RTPS/DDS compliance tested and published with full spec references. Complete transparency β€” including our own divergences.

FastDDS
eProsima
tested
RTI Connext
DDS
tested
CycloneDDS
Eclipse
tested
OpenDDS
OCI
tested

HDDS Divergences

Every intentional spec divergence is documented with ID, justification, and tracking issue. Full transparency.

Codegen Audit

FNV-1a member ID hashing (AUDIT-001 fix), @non_serialized support, @nested compliance β€” audited against OMG IDL 4.2 spec.

FeatureHDDSFastDDSRTICycloneDDS
SPDP DiscoveryPASS (tested)PASS (tested)PASS (tested)PASS (tested)
CDR2 SerializationPASS (tested)PASS (tested)PASS (tested)PASS (tested)
96 QoS CombinationsPASS (tested)PASS (tested)PASS (tested)PASS (tested)
DATA_FRAG SubmessagePASS (tested)PASS (tested)PASS (tested)N/A (untested)

Supply Chain Security

Signed SBOM with complete dependency transparency. Every component documented, verified, and traceable.

501
dependencies documented
CycloneDX
JSON + XML
GPG
detached signature
Sigstore
cosign transparency log
TYPICAL DDS VENDOR
  • 13 components listed
  • Last updated Oct 2024
  • Unsigned PDF format
  • No cryptographic verification
HDDS
  • 501 dependencies documented
  • Updated Feb 2026
  • GPG + cosign signed
  • CycloneDX JSON/XML machine-readable
SHA256SUMS (example format)
76cbf52c...4716bd8  hdds-1.0.8.cdx.json
7e7064a9...d31a4bc  hdds-1.0.8.cdx.xml

Audit Suppression

Legitimate exceptions can be marked with documented justification. Every suppression is counted and tracked.

// @audit-ok: intentional dialect-specific implementation
// Required for RTI Connext 6.x compatibility (non-standard GUID encoding)
let magic = 0xDEADBEEF;

// @audit-ok: FNV-1a algorithm constants (well-known, verified)
const FNV_OFFSET: u64 = 0x811c9dc5;
const FNV_PRIME: u64 = 0x01000193;

CI/CD Integration

πŸ”’

Pre-Commit Hook

Single-file audit runs before every commit. Blocks commits with critical issues.

πŸ”„

PR Validation

Full 19-layer audit on every pull request. No merge with critical/high violations.

πŸ“Š

Nightly Reports

Comprehensive audit reports generated nightly with trend analysis.

Review the Audit Script

Our extreme audit scanner is open source. 1,685 lines of bash enforcing industrial-grade quality.

β€œReady for deployment in nuclear submarines”

β€” extrem-audit-scan.sh exit message on perfect score