-
-
Notifications
You must be signed in to change notification settings - Fork 560
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerabilities found through cargo audit #901
Comments
As of today:
Following
|
Thank you for your issue! Unmaintained is not a security vulnerability. The code fulfils it's purpose, unless and until there is actual vulnerability in that code, it isn't considered a vulnerability. |
The others are warnings, but this is a vulnerability:
|
Closing. CVE metrics is an exaggerated form of security paranoia. |
Hot take and poor security management honestly. You really could handle this much better. Is there some reason tokei depends on old git2? If not, update it. If so, state it. If the vulnerability does not affect tokei, state that (which is kind of what you did, but fairly dismissively). Honestly I quite agree with the potential for excessive paranoia, but there's a reasonable way to manage your own dependencies. |
I'm going to lock this issue, this is not the place for general security opinions. If you have specific improvements, feel free create a PR or issue. |
Hello, I was planning to package this software for opensuse and possibly push it to their Factory repository. Just notifying you that the openSUSE commandline tool for openSUSE Build Service
osc
has detected some vulnerabilties.Maybe an update to the latest versions of the following crate will mitigate the issues.
The text was updated successfully, but these errors were encountered: