Skip to content

[FEATURE] Rust Security Workflow (Fuzzing + SAST) #2

@tduhamel42

Description

@tduhamel42

Use Case

Why is this Rust workflow needed?
E.g., automating cargo-fuzz, detecting dependency vulnerabilities with cargo-audit, enforcing Clippy rules, or preventing unsafe code patterns.

Proposed Solution

How should this workflow work in FuzzForge?

  • Fuzzing: Preconfigured cargo-fuzz, sanitizer builds, regression corpora.
  • SAST: cargo-audit against RustSec DB, Clippy linting, unsafe code checks.
  • Combined: One Rust Security workflow that runs fuzzing + SAST in CI.

Alternatives

Other approaches you considered (e.g., manual GitHub Actions setup, third-party CI tools, manual runs).

Implementation

(Optional) Technical details like YAML snippets, Docker setup, or using cargo-deny.

Category

  • 🛠 Workflow Automation
  • 🔗 Fuzzer Integration
  • 🔍 SAST / Static Analysis

Additional Context

Links:

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions