A complete RSA cryptosystem in 160 bytes more than "Hello World." No runtime. No dependencies. No supply chain. Just verified machine code.
We built a toy RSA encryption tool — keygen, encrypt, decrypt — using Semcom's verified modular exponentiation capability. Then we measured.
Standard C program. printf("hello")
Keygen + encrypt + decrypt. Verified modular exponentiation.
The difference: 160 bytes. That's the entire RSA implementation — a verified modular exponentiation function compiled to 29 ARM64 instructions. Everything else is the same Mach-O container overhead that any program pays.
The verified capability — mod_exp, 33 lines of LLVM IR compiled to 29 machine instructions — is 0.3% of the binary. The rest is operating system packaging.
On Linux with static linking, the binary is 67KB. In a FROM scratch Docker container, that's the entire image.
The container has one file. No package manager. No OS. No libraries. No node_modules. No requirements.txt. Nothing to CVE. Nothing to patch. Nothing to audit except the binary itself.
The mod_exp function — modular exponentiation via repeated squaring — was synthesized by the Semantic Compiler. It was validated against test cases, verified for semantic correctness, and installed permanently in the Method Dictionary. This is the complete source:
33 lines. Synthesized from intent, validated with test cases, compiled to 29 machine instructions. Every program built with Semcom has this level of transparency.
Source code → compiler → binary. Trust the developer. Trust the compiler. Trust 1,200 transitive dependencies you've never read.
Intent → verified IR → binary. Every function has test evidence. Every capability is inspectable. The supply chain is empty because there is no supply chain.