Memory safety is a real problem. Roughly 70% of CVEs in Chrome and Microsoft products trace back to memory safety bugs — use-after-free, buffer overflows, dangling pointers. The data is compelling and nobody serious disputes it.
What is disputable is who’s driving the solution — and who benefits from it. Since 2022, the US government has issued a cascade of reports urging adoption of “memory-safe languages,” with Rust as the clear favorite. These reports are routinely treated as independent security guidance. But trace the money, the data, and the organizational ties, and a different picture emerges: the companies that invested earliest and heaviest in Rust are the same ones whose data, executives, and funding shaped the policy that now pressures an entire industry to follow them.
The Rust Foundation: Follow the Platinum
The Rust Foundation was launched in February 2021 with five founding Platinum members: Google, Microsoft, Amazon Web Services, Huawei, and Mozilla. Each committed to a two-year, million-dollar budget. Meta joined at the Platinum level shortly after, followed by JFrog. By 2022, the foundation had 39 member companies, and the Platinum roster read like a who’s-who of companies that would later benefit most from government Rust mandates.
This isn’t unusual — corporate foundations supporting open-source languages are common. What’s unusual is how directly these same companies’ data and advocacy fed into government policy within a year of the Foundation’s creation. As IDC analyst Arnal Dayaratna told TechTarget: “Both of these decisions are illustrative of a desire to steer the evolution of each respective language.” Constellation Research analyst Holger Mueller was blunter: “Tech vendors seem to have found a heart recently to fund foundations, mostly because they need the standards to interoperate to protect investments.”
Google: Manufacturing the Evidence Base
Google’s role in the Rust-to-government pipeline is the most direct. Starting around 2019, Google began shifting new Android development to memory-safe languages. By 2022, Google engineer Jeff Vander Stoep was publishing data showing that memory safety vulnerabilities in Android had dropped from 223 in 2019 to 85 in 2022 — and attributing the decline primarily to Rust adoption.
This data became the case study cited by every subsequent government report. CISA’s 2023 guidance referenced it. The White House ONCD report referenced it. The June 2025 CISA/NSA joint report cited Google’s Android data as the primary industry evidence for memory-safe language effectiveness. By November 2025, Google was claiming a “1000x reduction in memory safety vulnerability density” in Rust code compared to C/C++.
Google didn’t just supply the data — it funded the ecosystem that made Rust viable. In February 2024, Google announced a $1 million grant to the Rust Foundation specifically to improve Rust-C++ interoperability through tools like Crubit. Google VP Dave Kleidermacher stated the investment aimed to “expand the adoption of Rust across various components of the platform.” Google also began integrating Rust into Chromium in 2023, affecting not just Chrome but every Chromium-based browser — Edge, Opera, Brave, and dozens more.
The pattern: Google produces data showing Rust works → government cites Google’s data in policy documents → policy pressures industry to adopt Rust → Google’s existing Rust investment becomes a competitive advantage.
Microsoft: From a Tweet to National Policy
Microsoft’s Rust advocacy began in 2019 when the Microsoft Security Response Center revealed that 70% of their CVEs over the past 12 years were memory safety issues. That statistic became the single most-cited data point in the memory safety debate.
In September 2022, Azure CTO Mark Russinovich posted on Twitter: “It’s time to halt starting any new projects in C/C++ and use Rust for those scenarios where a non-GC language is required. For the sake of security and reliability, the industry should declare those languages as deprecated.” He framed it as a personal opinion, not Microsoft policy. But within months, Microsoft had begun rewriting parts of the Windows kernel in Rust, and Russinovich’s “personal opinion” had effectively become corporate direction.
At RustConf 2025, Russinovich delivered a keynote titled “From Blue Screens to Orange Crabs: Microsoft’s Rusty Revolution,” describing how Rust code was already running in the Windows kernel (win32kbase_rs.sys). In December 2025, Microsoft Distinguished Engineer Galen Hunt posted a LinkedIn job listing stating: “My goal is to eliminate every line of C and C++ from Microsoft by 2030.” Though Hunt later clarified this was a research project, not a Windows strategy, the ambition was clear.
Microsoft’s 70% statistic and Google’s Android data form the two pillars of the government’s case. Both companies are Platinum Rust Foundation members. Both stand to benefit from the policy they helped justify.
Amazon: Cloud Leverage
Amazon’s position is perhaps the most structurally significant. AWS is the US government’s dominant cloud provider, holding a $10 billion NSA contract, part of the $9 billion JWCC Pentagon contract, and a fresh $1 billion GSA OneGov agreement signed in 2025. When the government’s largest cloud vendor is also a founding Platinum Rust Foundation member, the line between vendor preference and policy influence becomes very thin.
AWS has built critical infrastructure in Rust. Firecracker, the microVM technology powering AWS Lambda and Fargate, is written entirely in Rust. Bottlerocket, Amazon’s container-optimized Linux distribution, uses Rust for its build system. The EC2 team has adopted Rust as its preferred language for new AWS Nitro System components.
Amazon also funds the broader Rust ecosystem through ISRG’s Prossimo project. In 2024, AWS committed $1 million to Prossimo to fund memory-safe rewrites of critical internet infrastructure — an AV1 decoder, sudo/su, the Rustls TLS library, and NTP. AWS Head of Open Source Strategy David Nalley called it “furthering ISRG’s mission to build a more memory safe internet.”
The incentive structure is straightforward: AWS builds government cloud infrastructure in Rust → government mandates memory-safe languages → competitors face rewrite costs → AWS’s existing Rust investment becomes a moat.
DARPA TRACTOR: Taxpayer-Funded Rust Migration
The corporate lobbying didn’t stop at shaping policy documents. In July 2024, DARPA launched TRACTOR — Translating All C to Rust — a program to fund automated C-to-Rust conversion using LLMs. The program awarded contracts to seven academic teams at roughly $2 million each, for a total of approximately $14 million.
DARPA program manager Dan Wallach framed it as addressing the practical reality that “rewriting code is expensive and labor-intensive, and organizations with large legacy codebases simply cannot afford that in many cases.” But the framing itself is revealing: DARPA isn’t funding research into making C safer, or exploring Ada, or investigating hardware-based memory safety solutions like CHERI at comparable scale. It’s funding automated conversion to one specific language — the same one its biggest government contractors happen to have invested in.
One company already positioned to benefit: Immunant, which maintains a C-to-Rust translation tool developed with prior DARPA support. The University of Illinois team received a DARPA-issued TRACTOR award to build tools targeting “critical infrastructure domains, including aerospace, automotive, and defense.”
The Prossimo Pipeline
The connection between corporate funding and government policy runs through several intermediary organizations. ISRG’s Prossimo project — operated by the nonprofit behind Let’s Encrypt — is explicitly dedicated to “moving critical software to memory safe code,” which in practice means rewriting things in Rust. Prossimo pays the primary maintainer of Rust for Linux, Miguel Ojeda, and has been funding his full-time work since April 2021.
Prossimo’s funding comes substantially from corporate sources. AWS provided $1 million. The OpenSSF Alpha-Omega project provided $530,000 for Rustls and Rust for Linux work. Alpha-Omega itself is funded by Google and Microsoft. So Google and Microsoft fund Alpha-Omega, which funds Prossimo, which pays the developer maintaining Rust in the Linux kernel, which then becomes evidence that Rust is production-ready for kernel work, which gets cited in government reports recommending Rust adoption.
The money flows in a circle, and at each stop it generates “independent” evidence that Rust is the answer.
The CISA Secure by Design Pledge
CISA’s “Secure by Design” pledge operationalizes the pressure. The voluntary pledge asks software manufacturers to demonstrate progress on seven goals within a year of signing, including “publishing a memory safety roadmap.” As of late 2025, over 296 organizations had signed, including GitHub, Google, and other major players.
The progress reports are illuminating. Companies cite their Rust adoption as compliance evidence. Cloudflare’s statement references “open sourcing our proxy built in memory safe Rust.” Beyond Identity titled its report “Getting Rusty: Beyond Identity’s Journey to Memory Safety.” The pledge is nominally language-agnostic, but in practice “memory safety roadmap” has become a synonym for “Rust adoption plan.”
CISA has set a January 1, 2026 deadline for organizations to publish memory safety roadmaps. The language is voluntary, but CISA warns that failing to act “significantly elevates risk to national security, national economic security, and national public health and safety.” For government contractors, voluntary guidance from CISA has a way of becoming mandatory through procurement requirements.
What the Feedback Loop Leaves Out
The corporate-government Rust feedback loop systematically marginalizes alternatives.
Ada — the language the DoD itself once mandated for safety-critical systems — was added to the NSA’s memory-safe list only after the original 2022 publication, an apparent afterthought. Ada, with its ISO standardization, multiple compiler implementations, formally verifiable SPARK subset, and decades of deployment in aviation (DO-178C) and defense, should be the default recommendation for the very systems the policy targets. But Google, Microsoft, and Amazon have no Ada investment, no Ada ecosystem presence, and no Ada hiring pipeline. Ada doesn’t benefit the companies driving the conversation.
C++ modernization approaches — sanitizers, static analysis, formal verification, Safe C++ proposals — are dismissed rather than evaluated. Google’s own C++ Style Guide implicitly acknowledges that modern C++ with proper tooling can be made substantially safer. But “invest in tooling” doesn’t create the same vendor advantage as “switch to the language we already use.”
Hardware-based solutions like CHERI (Capability Hardware Enhanced RISC Instructions) and ARM’s Memory Tagging Extensions get brief mentions in government reports but no comparable policy push or DARPA-scale funding directed at their adoption. These technologies can protect existing C/C++ code without rewrites — which is precisely why they’re less interesting to companies selling Rust migration services.
The Standardization Trap
The governance risk compounds the influence problem. C++ is specified by an ISO standard with multiple competing compilers (GCC, Clang, MSVC). Ada is similarly ISO-standardized with multiple implementations. Rust has a single compiler (rustc), a single reference implementation, an incomplete specification effort, and governance by the Rust Foundation — which is controlled by its Platinum corporate members.
The Rust Foundation’s board includes seats for its corporate sponsors alongside community representatives. As TechInformed reported, Foundation CEO Rebecca Rumbul claimed community members get veto power over corporate decisions. But the financial dependency is real: the Foundation’s operations depend on Platinum member dues. When Google, Microsoft, and Amazon collectively fund the foundation, the language’s governance, and the ecosystem infrastructure, they wield structural influence even without explicit control.
The Rust for Linux project’s internal turmoil — with key maintainer Wedson Almeida Filho quitting over “non-technical nonsense” — and chronic maintainer burnout illustrate what happens when a language’s community infrastructure can’t match the expectations being placed on it by corporate and government pressure.
The Pattern
This isn’t a conspiracy. It’s something more mundane and more durable: structural incentive alignment.
Google, Microsoft, and Amazon made early, large investments in Rust. Those investments produced data showing Rust reduced vulnerabilities in their products. That data was cited by government agencies building the case for memory-safe language adoption. The resulting policy pressure benefits the companies that invested early while imposing transition costs on competitors. Government funding (DARPA TRACTOR) and nonprofit intermediaries (Prossimo, OpenSSF) further accelerate Rust specifically, funded by the same companies that benefit from adoption. The cycle reinforces itself.
A genuinely security-motivated policy would look different. It would establish formal criteria for memory safety rather than maintaining a curated list. It would equally weight Ada, which already meets every stated requirement. It would evaluate tooling-based approaches against language-transition approaches on cost-effectiveness. It would treat Rust’s unsafe escape hatch with the same scrutiny applied to C/C++. And it would ensure the governance of any recommended language isn't dominated by a handful of corporations with financial interests in its adoption.
Instead, we have a policy that was shaped by corporate data, amplified by corporate advocacy, funded by corporate money, and structured to benefit the corporations that shaped it. The borrow checker is brilliant engineering. But what’s being forced onto the industry isn’t just a borrow checker — it’s an ecosystem, a hiring pipeline, a vendor dependency, and a governance structure, all wrapped in the language of national security.
The question isn’t whether memory safety matters. It does. The question is whether the right response is a government mandate that happens to align perfectly with the commercial interests of the companies that lobbied for it.
References
Rust Foundation and Corporate Investment
- Rust Foundation, Members page (Platinum: AWS, Google, Huawei, Meta, Microsoft, Mozilla): https://rustfoundation.org/members/
- TechCrunch, “AWS, Microsoft, Mozilla and Others Launch the Rust Foundation,” February 2021: https://techcrunch.com/2021/02/08/the-rust-programming-language-finds-a-new-home-in-a-non-profit-foundation/
- TechTarget, “Google, Microsoft Back Python and Rust Programming Languages,” 2021: https://www.techtarget.com/searchapparchitecture/news/252496553/Google-Microsoft-back-Python-and-Rust-programming-languages
- The Register, “Google Throws $1M at Rust Foundation to Build C++ Bridges,” February 2024: https://www.theregister.com/2024/02/05/google_rust_donation/
- Rust Foundation Security Team Announcement (JFrog Platinum, Alpha-Omega funding), September 2022: https://www.prnewswire.com/news-releases/rust-foundation-establishes-security-team-to-support-and-advance-rust-programming-language-301622579.html
- TechInformed, “World in Disruption: Trust in Rust” (Foundation governance and corporate influence), April 2024: https://techinformed.com/world-in-disruption-trust-in-rust/
- Techzine, “Tech Giants Are Adopting Rust En Masse — But the Project Behind It Is Brittle,” October 2024: https://www.techzine.eu/blogs/devops/124797/tech-giants-are-adopting-rust-en-masse-but-the-project-behind-it-is-brittle/
- Rust Magazine, “2022 Review: The Adoption of Rust in Business”: https://rustmagazine.org/issue-1/2022-review-the-adoption-of-rust-in-business/
Google — Android and Chromium Rust Adoption
- Google Security Blog, “Rust in Android: Move Fast and Fix Things,” November 2025: https://security.googleblog.com/2025/11/rust-in-android-move-fast-fix-things.html
- The Hacker News, “Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time,” November 2025: https://thehackernews.com/2025/11/rust-adoption-drives-android-memory.html
- The Register, “Google Says Android Runs Better When Covered in Rust,” December 2022: https://www.theregister.com/2022/12/02/android_google_rust/
- The Hacker News, “Google’s Shift to Rust Programming Cuts Android Memory Vulnerabilities by 68%,” September 2024: https://thehackernews.com/2024/09/googles-shift-to-rust-programming-cuts.html
- The Register, “Google’s Rust Belts Bugs Out of Android in Safe Coding Push,” September 2024: https://www.theregister.com/2024/09/25/google_rust_safe_code_android/
- Google Security Blog, “Supporting the Use of Rust in the Chromium Project,” January 2023: https://security.googleblog.com/2023/01/supporting-use-of-rust-in-chromium.html?m=1
- Google Security Blog, “An Update on Memory Safety in Chrome,” September 2021: https://security.googleblog.com/2021/09/an-update-on-memory-safety-in-chrome.html?m=1
Microsoft — Rust Adoption and Advocacy
- DEVCLASS, “Microsoft Azure CTO Mark Russinovich: C/C++ Should Be Deprecated,” September 2022: https://devclass.com/2022/09/20/microsoft-azure-cto-on-c-c/
- The Register, “In Rust We Trust: Microsoft Azure CTO Shuns C and C++,” September 2022: https://www.theregister.com/2022/09/20/rust_microsoft_c/
- Thurrott, “Microsoft Is Rewriting Parts of the Windows Kernel in Rust,” April 2023: https://www.thurrott.com/windows/282471/microsoft-is-rewriting-parts-of-the-windows-kernel-in-rust
- The New Stack, “Microsoft’s Bold Goal: Replace 1B Lines of C/C++ With Rust,” December 2025: https://thenewstack.io/microsofts-bold-goal-replace-1b-lines-of-c-c-with-rust/
- Thurrott, “Microsoft to Replace All C/C++ Code With Rust by 2030,” December 2025: https://www.thurrott.com/dev/330980/microsoft-to-replace-all-c-c-code-with-rust-by-2030
- Windows Central, “Microsoft Bets on AI to Modernize Windows,” December 2025: https://www.windowscentral.com/microsoft/windows-11/my-goal-is-to-eliminate-every-line-of-c-and-c-from-microsoft-by-2030-microsoft-bets-on-ai-to-finally-modernize-windows
- InfoWorld, “Microsoft Is Not Rewriting Windows in Rust” (clarification), December 2025: https://www.infoworld.com/article/4111553/microsoft-is-not-rewriting-windows-in-rust.html
- IT Pro, “Microsoft Rust Programming Language Modernization,” December 2025: https://www.itpro.com/software/development/microsoft-rust-programming-language-modernization-ai
Amazon — AWS, Firecracker, and Prossimo Funding
- Firecracker microVM (written in Rust, powers AWS Lambda and Fargate): https://firecracker-microvm.github.io/
- Prossimo (ISRG), “AWS Commits $1M to Advance Four Prossimo Initiatives,” 2024: https://www.memorysafety.org/blog/aws-funding/
- Nextgov, “NSA Re-awards Secret $10 Billion Contract to Amazon,” April 2022: https://www.nextgov.com/emerging-tech/2022/04/nsa-re-awards-secret-10-billion-contract-amazon/366184/
- AWS Public Sector Blog, “AWS Selected for U.S. DoD JWCC Contract,” December 2022: https://aws.amazon.com/blogs/publicsector/aws-selected-for-u-s-department-of-defense-joint-warfighting-cloud-capability-contract/
- GSA, “OneGov Agreement with AWS — Up to $1 Billion in Savings,” August 2025: https://www.gsa.gov/about-us/newsroom/news-releases/gsa-announces-onegov-agreement-with-aws-08072025
DARPA TRACTOR Program
- DARPA, “TRACTOR: Translating All C to Rust” (official program page): https://www.darpa.mil/program/translating-all-c-to-rust
- DARPA, “Eliminating Memory Safety Vulnerabilities Once and For All” (announcement), July 2024: https://www.darpa.mil/news-events/2024-07-31a
- The New Stack, “Can DARPA’s TRACTOR Pull C to Rust for Memory-Safe Overhaul?”, August 2024: https://thenewstack.io/can-darpas-tractor-pull-c-to-rust-for-memory-safe-overhaul/
- Dark Reading, “DARPA Aims to Ditch C Code, Move to Rust,” August 2024: https://www.darkreading.com/application-security/darpa-aims-to-ditch-c-code-move-to-rust
- The Register, “DARPA Suggests Turning Legacy C Code Automatically Into Rust,” August 2024: https://www.theregister.com/2024/08/03/darpa_c_to_rust/
- University of Illinois CSL, “Translating Legacy Code for a Safer Future: DARPA Backs Effort to Convert C to Rust”: https://csl.illinois.edu/news-and-media/translating-legacy-code-for-a-safer-future-darpa-backs-effort-to-convert-c-to-rust
ISRG Prossimo and OpenSSF
- Prossimo (ISRG Memory Safety Initiative): https://www.memorysafety.org/
- Prossimo, “Advancing Rustls and Rust for Linux with OpenSSF Support” ($530K funding), 2024: https://www.memorysafety.org/blog/rustls-and-rust-for-linux-funding-openssf/
- OpenSSF, “Advancing Rustls and Rust for Linux with OpenSSF Support,” September 2023: https://openssf.org/blog/2023/09/18/advancing-rustls-and-rust-for-linux-with-openssf-support/
- The New Stack, “Prossimo: Making the Internet Memory Safe,” November 2021: https://thenewstack.io/prossimo-making-the-internet-memory-safe/
- Prossimo, Rustls TLS Library Initiative: https://www.memorysafety.org/initiative/rustls/
Government Policy Documents
- NSA, “Software Memory Safety,” Cybersecurity Information Sheet, November 2022: https://media.defense.gov/2022/Nov/10/2003112742/-1/-1/0/CSI_SOFTWARE_MEMORY_SAFETY.PDF
- CISA, NSA, FBI, et al., “The Case for Memory Safe Roadmaps,” December 2023: https://www.cisa.gov/sites/default/files/2023-12/The-Case-for-Memory-Safe-Roadmaps-508c.pdf
- White House ONCD, “Back to the Building Blocks: A Path Toward Secure and Measurable Software,” February 2024: https://bidenwhitehouse.archives.gov/oncd/briefing-room/2024/02/26/press-release-technical-report/
- CISA & NSA, “Memory Safe Languages: Reducing Vulnerabilities in Modern Software Development,” June 2025: https://media.defense.gov/2025/Jun/23/2003742198/-1/-1/0/CSI_MEMORY_SAFE_LANGUAGES_REDUCING_VULNERABILITIES_IN_MODERN_SOFTWARE_DEVELOPMENT.PDF
- CISA, “Secure by Design” Initiative and Pledge: https://www.cisa.gov/securebydesign https://www.cisa.gov/securebydesign/pledge
- CISA, Secure by Design Pledge — Progress Reports: https://www.cisa.gov/securebydesign/pledge/progress-reports
- CISA, Secure by Design Pledge — Statements of Support: https://www.cisa.gov/securebydesign/pledge/statements-of-support
- CISA, “The Urgent Need for Memory Safety in Software Products”: https://www.cisa.gov/news-events/news/urgent-need-memory-safety-software-products
Reporting and Analysis
- The Register, “CISA, NSA Repeat Call for Memory Safe Programming Languages,” June 2025: https://www.theregister.com/2025/06/27/cisa_nsa_call_formemory_safe_languages/
- CPO Magazine, “New CISA/NSA Joint Report Reiterates Call for Memory-Safe Languages,” June 2025: https://www.cpomagazine.com/cyber-security/new-cisa-nsa-joint-report-reiterates-call-for-memory-safe-languages/
- Bleeping Computer, “White House Urges Devs to Switch to Memory-Safe Programming Languages,” February 2024: https://www.bleepingcomputer.com/news/security/white-house-urges-devs-to-switch-to-memory-safe-programming-languages/
- DEVOPSdigest, “Fix It or Face the Consequences: CISA’s Memory-Safe Muster” (296 pledge signatories, Jan 2026 deadline): https://www.devopsdigest.com/fix-it-or-face-the-consequences-cisas-memory-safe-muster
- Stack Overflow, “In Rust We Trust? White House Office Urges Memory Safety,” December 2024: https://stackoverflow.blog/2024/12/30/in-rust-we-trust-white-house-office-urges-memory-safety/
- The Register, “Microsoft Wants to Replace Its Entire C and C++ Codebase, Perhaps by 2030,” December 2025: https://www.theregister.com/2025/12/24/microsoft_rust_codebase_migration/