A vulnerability database for the Rust ecosystem
Tooling
cargo-audit
Audit
Cargo.lock
files for crates with security vulnerabilities.
> cargo audit
Scanning Cargo.lock for vulnerabilities (4 crate dependencies)
Crate: lz4-sys
Version: 1.9.3
Title: Memory corruption in liblz4
Date: 2022-08-25
ID: RUSTSEC-2022-0051
URL: https://rustsec.org/advisories/RUSTSEC-2022-0051
Solution: Upgrade to >=1.9.4
Dependency tree:
lz4-sys 1.9.3
└── crate 0.1.0
error: 1 vulnerability found!
cargo-deny
Audit
Cargo.lock files for crates with security
vulnerabilities, limit the usage of particular dependencies, their licenses, sources to download
from, detect multiple versions of same packages in the dependency tree and more.
cargo-auditable
Embed the dependency tree into compiled executables, to make production Rust binaries auditable by cargo-audit.
cargo-audit Github action
Audit changes, schedule dependencies audits and open issues for found vulnerabilities using cargo-audit with the
rust-audit-check Github action.
cargo-deny Github action
Audit changes and schedule dependencies audits
using cargo-deny with the cargo-deny-action Github action.
Data Interchange
We export all our data to Open Source Vulnerabilities in real time. This enables many other tools, such as Trivy, to access RustSec advisories.
You can access RustSec advisories in the OSV format either directly as a zip archive or using the OSV API.
The Github Advisory Database imports our advisories and makes them available in its public API.
This allows dependabot to fix vulnerable dependencies for you by raising pull requests with security updates.
About
The RustSec Advisory Database is a repository of security advisories filed against Rust crates published via crates.io maintained by the Rust Secure Code Working Group.