RunSafe Security
continuous delivery of runtime-protected code
Many of today’s most damaging cyber attacks exploit memory corruption vulnerabilities (e.g. heap overflow, stack overflow), which persist even with code scanning.
RunSafe Security’s Alkemist is a suite of software tools that apply memory protections directly into code, enabling that code to protect itself from memory corruption vulnerabilities without altering the functionality of the code.
Alkemist provides run-time protection to a wide range of systems without changing original functionality. Alkemist reduces attack surfaces and improves Cyber Supply Chain Risk Management (C-SCRM). Target software includes inhouse developed, COTS, GOTS, and open source running on IT enterprise equipment, OT and IoT devices, and specialized embedded systems. Alkemist protected software components are immunized against memory corruption attacks, including zero-days. Alkemist disrupts memory exploitation by varying the attack surface (the layout of your code).
Alkemist products seamlessly integrate protections into your software development life cycle at build or deploy time. With Alkemist, you have two options: Alkemist:Source and Alkemist:Repo.

Alkemist: Source
Alkemist:Source randomizes the memory address for each function, making reliable exploitation nearly impossible for an attacker. Alkemist:Source uses a proprietary technique called Load-time Function Randomization (LFR).
Alkemist:Source features
- Low Overhead
- Alkemist:Source has an imperceptible effect on program initialization and runtime performance. When using the SPEC CPU2006 test suite, Alkemist:Source adds less than a 1% overhead to most of the benchmark running times. This percentage drops even lower when Alkemist:Source is applied to long-running services/daemons.
- Load-time Randomization
- Binaries built with Alkemist:Source are randomized when loaded into main memory. This means that protected programs can be distributed just like traditional programs and can use the same checksum and signature tools too.
- Easy to Use
- No changes to build tools or processes are required. In most cases, using Alkemist:Source is as easy as prepending our helper script to the beginning of your build command.
How Alkemist Works
Alkemist:Repo
Alkemist:Repo applies Alkemist:Source to common open-source applications, repackaging them with memory protections by default.
Alkemist:Repo Features
- Proven Protection
- Alkemist:Repo offerings infuse run-time cyber protections directly into open source code using Alkemist:Source technology. Software is automatically secured from the most common and severe types of cyber attacks with the highest level of protection.
- Secures Third-Party Software
- When using open-source software, developers have minimal insight into and control over the security of those applications. By using Alkemist:Repo, the same applications can be used while knowing that an entire class of security vulnerabilities has been mitigated.
- Seamless Integration
- Deploying with Alkemist:Repo is as simple as modifying where your software is currently installed from to point at RunSafe servers.
Contact us on (866) 887-0489 or info@releaseteam.com today to speak to an expert about your next DevOps project.
Let's Talk DevOps!
Call: (866)-887-0489
Email: info@releaseteam.com
Corporate HQ
1400 W 122nd Ave.
Suite 202
Denver, CO 80234
720-887-0489
GSA Schedule:
GS-35F-186BA
Massachusetts
1257 Worcester Rd.
Suite 108
Framingham, MA 01701
866-887-0489
Canada
PMB# 604
1-110 Cumberland St.
Toronto, ON M5R 3V5
866-887-0489