-
Notifications
You must be signed in to change notification settings - Fork 37
Add CI workflow for dependency vulnerability scanning #480
Copy link
Copy link
Open
Description
Summary
The project currently has no CI check for known vulnerabilities (CVEs) in dependencies. cargo-deny is already installed in CI for license checking, but cargo deny check advisories is not run.
Proposal
- Add
cargo deny check advisoriesto the existingcheck_license_and_formattingworkflow — catches vulnerabilities on every PR. - Add a scheduled
audit.ymlworkflow (e.g. weekly cron) — catches newly disclosed CVEs against existing dependencies onmain. - Add an
[advisories]section todeny.tomlto configure severity thresholds.
Context
cargo-deny@0.14.22is already pinned in CI for license checksCargo.lockis now committed (after chore: improve cargo cache #478), socargo deny check advisories/cargo auditwill work correctly- A recent audit found 1 vulnerability (RUSTSEC-2026-0066 in
astral-tokio-tar) and 1 unmaintained crate warning (rustls-pemfile), both resolved by upgradingtestcontainersto 0.27.2
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels
Type
Fields
Give feedbackNo fields configured for issues without a type.