Rust in Safety-Critical Systems: Predictions for 2026
What you'll learn:
- Where Rust is right now.
- What are the likely developments in 2026.
- Sector implications and examples.
Production-grade Rust is here and it looks to meet the requirement of safety-critical industries. While Rust’s memory-safety guarantees are compelling, certification demands far more than safe code. It requires predictable execution, qualified toolchains, supply-chain trust, and auditable evidence. This article explores how Rust is evolving to meet these expectations, where early deployments are taking shape, and what organizations must do to translate innovation into a certifiable, long-term engineering advantage.
Regulators, primes, and Tier-1 suppliers increasingly expect memory-unsafe defects to be engineered out of critical paths. Rust’s ownership and type system eliminate whole classes of vulnerabilities at compile time, but certification demands more than an absence of undefined behavior.
It requires disciplined processes, predictable execution, transparent supply chains, assured long-term support, and evidence that can be presented to an auditor. 2026 is the year when we stop asking whether Rust belongs in safety-critical software and start asking where it moves the assurance needle fastest.
State of Play
Pilots are real. Multiple organizations have shipped internal prototypes or non-critical modules in Rust. The common pattern: contain risk at system edges — parsers, communications, crypto, and device interfaces — before moving further into control logic.
Tooling is close. Static analysis, fuzzing, coverage, and timing analysis for Rust continue to mature, and formal toolchain qualification has started to enter vendor roadmaps.
Rust Predictions for 2026
The momentum behind Rust in the safety-critical domain is expected to continue growing through 2026, with adoption expanding into production-level subsystems. The early enthusiasm surrounding Rust’s safety guarantees will give way to a more mature phase in which organizations balance innovation with certification constraints. As this shift occurs, several trends are already becoming clear.
The first is the emergence of a practical, widely accepted subset of Rust that’s safety-critical. While Rust’s full feature set continues to evolve at high velocity, certifiable software developers will converge on a stable, conservative subset focused on predictable compilation, analyzable semantics, deterministic execution, and controlled use of advanced language features.
Much like MISRA C or SPARK subsets, this “Rust for Safety” profile will become the de facto baseline for certification, not imposed by any single authority but shaped organically through industry experience, shared guidelines, and tool support. As part of this consolidation, organizations will increasingly rely on long-term-supported toolchain versions, with vendors offering critical fixes on frozen branches rather than forcing updates to fast-moving upstream releases.
At the same time, mixed-language architectures will continue to be the standard practice. Most safety-critical teams will continue relying on large C, C++, or Ada codebases while selectively introducing Rust for components that benefit from its strong safety properties. This will drive growing demand for robust mixed-language tooling, particularly in areas such as cross-language debugging, static analysis, and coverage measurement.
Successful 2026 projects will be those that introduce Rust incrementally rather than attempting full rewrites.
A third trend is that toolchain qualification and library certification efforts will continue to solidify. By 2026, vendors will provide stabilized Rust toolchains suitable for qualification under DO-178C, ISO 26262, IEC 61508, and EN 50716. Early qualification kits will appear, covering compiler configurations, build-system workflows, package-manager restrictions, coding-standard enforcement, and coverage-analysis tools. In parallel, certifiable subsets of Rust run-time libraries will begin to emerge.
While these offerings will not yet be exhaustive, they will be enough for early adopters to launch real certification programs with a credible and auditable toolchain story. And they’ll be backed by versioned, long-term-supported compiler branches with trackable defect histories and the ability to receive targeted fixes.
Ultimately, 2026 is anticipated to witness a significant rise in expectations regarding end-to-end supply chain trust. Safety-critical organizations will require signed, reproducible builds of Rust toolchains; verifiable SBOMs for all build components; and continuous vulnerability tracking across the Rust ecosystem.
This will move the industry beyond generic open-source trust toward a fully auditable supply chain that includes the compiler, its dependencies, the run-time libraries, and any crates allowed in restricted environments. Rust’s package ecosystem will adapt with more crates offering provenance guarantees and long-term support branches.
Taken together, these developments suggest that 2026 will be the year Rust transitions from exploratory adoption to structured, certification-aware deployment. The pace will remain cautious, governed by engineering realities, regulatory expectations, and certification constraints. However, the foundations will be firmly in place for Rust to become a credible option for new safety-critical programs.
Rust Sector Implications and Examples
Aerospace & Defense
Rust’s entry point in aerospace and defense will be lower-criticality systems, most commonly DAL C and DAL D modules. These levels offer a practical environment in which teams can accumulate certification evidence, validate toolchain usage, and qualify Rust workflows, laying the foundation for eventual use in higher-criticality DAL A/B functions.
Automotive
Automotive adoption is likely to advance faster than in aerospace and defense. The sector’s entrenched use of C and C++, and the well-known memory-safety problems associated with them, creates strong pressure for safer alternatives, particularly as vehicle software grows in complexity and exposure. Rust’s built-in guarantees directly address these weaknesses, making it an appealing candidate for early use in ASIL B/C components and for security-sensitive subsystems.
Conclusion
By 2026, Rust will have moved decisively from exploratory experimentation into early structured adoption within safety-critical industries. Its strong memory-safety guarantees and active ecosystem continue to attract significant interest. The next phase of adoption, though, will be shaped less by enthusiasm and more by the practical realities of certification, long-term support, and system integration.
Safety-critical programs will begin deploying Rust in narrowly scoped, lower-criticality components, DAL C/D in aerospace and defense, and ASIL B/C in automotive, where certification hurdles are manageable. Also, Rust’s safety benefits can be realized without endangering program schedules. These early deployments will serve as proving grounds, generating evidence, experience, and confidence needed for future expansion into higher-criticality domains.
Across industries, mixed-language architectures will remain the norm. Rust will complement, not replace, existing C, C++, and Ada codebases, initially appearing in modules where memory safety provides a clear return on investment.
Meanwhile, the broader ecosystem will mature. A pragmatic, certifiable Rust subset will begin to take shape; qualification kits for stabilized toolchains will emerge; and early certifiable run-time subsets will be introduced. End-to-end supply-chain trust; signed, reproducible toolchains; verifiable SBOMs; and auditable dependencies will evolve from a “nice to have” to a procurement requirement.
All of these developments indicate a cautious yet steady trajectory. Rust will not displace established languages overnight, nor will it achieve full certification readiness across all standards within a single year.
However, the foundations built throughout 2026 will position Rust as a serious and increasingly credible option for new safety-critical programs entering concept and early design phases. In this sense, 2026 will mark Rust’s transition from promising newcomer to an emerging member of the safety-critical software ecosystem.
About the Author
Tony Aiello
Product Manager, AdaCore
Tony Aiello is a Product Manager at AdaCore. Currently, he manages SPARK Pro and GNAT Pro for Rust, with a hand in UX and application of AI to AdaCore’s products. Tony has been principal investigator of multiple United States Air Force research projects that focus on the enhancement and application of formal methods to Air Force-relevant applications.
Previously, Tony led the SSI and QGen teams, led research directions, and was Head of Product at AdaCore. Before joining AdaCore, Tony was a Principal Scientist at, and briefly President of, Dependable Computing, a small research and development group focused on safety and formal methods.
