Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Run cargo audit in CI? #81

Open
GarkGarcia opened this issue Mar 29, 2020 · 2 comments
Open

Run cargo audit in CI? #81

GarkGarcia opened this issue Mar 29, 2020 · 2 comments

Comments

@GarkGarcia
Copy link
Contributor

Maybe we could run cargo audit on the CI for security audits. Just run it on my machine:

$ cargo audit
    Fetching advisory database from `https://github.com/RustSec/advisory-db.git`
      Loaded 73 security advisories (from ~/.cargo/advisory-db)
    Updating crates.io index
    Scanning Cargo.lock for vulnerabilities (79 crate dependencies)
error: Vulnerable crates found!

ID:       RUSTSEC-2020-0006
Crate:    bumpalo
Version:  3.2.0
Date:     2020-03-24
URL:      https://rustsec.org/advisories/RUSTSEC-2020-0006
Title:    Flaw in `realloc` allows reading unknown memory
Solution:  upgrade to >= 3.2.1
Dependency tree:
bumpalo 3.2.0
└── wasm-bindgen-backend 0.2.59
    └── wasm-bindgen-macro-support 0.2.59
        └── wasm-bindgen-macro 0.2.59
            └── wasm-bindgen 0.2.59
                ├── web-sys 0.3.36
                │   └── plotters 0.2.12
                │       └── criterion 0.3.1
                │           └── flurry 0.2.1
                ├── plotters 0.2.12
                └── js-sys 0.3.36
                    ├── web-sys 0.3.36
                    └── plotters 0.2.12

warning: 1 warning found

Crate:    bumpalo
Version:  3.2.0
Warning:  package has been yanked!

error: 1 vulnerability found!
warning: 1 warning found!
@jonhoo
Copy link
Owner

jonhoo commented Mar 29, 2020

Hmm, maybe, though it's unclear to me how much it helps on this crate since we do not check in the Cargo.lock file. We may want to run something like cargo-outdated so we know when we are holding back updates due to new major versions, but point releases and such I don't think should be too much of a concern.

@GarkGarcia
Copy link
Contributor Author

Hmm, maybe, though it's unclear to me how much it helps on this crate since we do not check in the Cargo.lock file. We may want to run something like cargo-outdated so we know when we are holding back updates due to new major versions, but point releases and such I don't think should be too much of a concern.

Seems quite reasonable to me.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants