2 # cargo-vet imports lock
4 [[publisher.aho-corasick]]
8 user-login = "BurntSushi"
9 user-name = "Andrew Gallant"
18 [[publisher.arbitrary]]
22 user-login = "fitzgen"
23 user-name = "Nick Fitzgerald"
25 [[publisher.async-trait]]
29 user-login = "dtolnay"
30 user-name = "David Tolnay"
36 user-login = "Amanieu"
37 user-name = "Amanieu d'Antras"
39 [[publisher.audio_thread_priority]]
43 user-login = "padenot"
44 user-name = "Paul Adenot"
46 [[publisher.authenticator]]
47 version = "0.4.0-alpha.24"
50 user-login = "jschanck"
51 user-name = "John Schanck"
57 user-login = "martinthomson"
58 user-name = "Martin Thomson"
60 [[publisher.byteorder]]
64 user-login = "BurntSushi"
65 user-name = "Andrew Gallant"
71 user-login = "Darksonn"
72 user-name = "Alice Ryhl"
78 user-login = "Amanieu"
79 user-name = "Amanieu d'Antras"
86 user-name = "Emilio Cobos Álvarez"
95 [[publisher.clap_builder]]
100 user-name = "Ed Page"
102 [[publisher.clap_derive]]
107 user-name = "Ed Page"
109 [[publisher.clap_lex]]
114 user-name = "Ed Page"
116 [[publisher.core-foundation]]
120 user-login = "jrmuizel"
121 user-name = "Jeff Muizelaar"
123 [[publisher.core-foundation-sys]]
128 user-name = "Josh Matthews"
130 [[publisher.core-graphics]]
134 user-login = "jrmuizel"
135 user-name = "Jeff Muizelaar"
137 [[publisher.core-graphics-types]]
142 user-name = "Josh Matthews"
144 [[publisher.core-text]]
148 user-login = "jrmuizel"
149 user-name = "Jeff Muizelaar"
151 [[publisher.derive_arbitrary]]
155 user-login = "fitzgen"
156 user-name = "Nick Fitzgerald"
162 user-login = "linabutler"
163 user-name = "Lina Butler"
169 user-login = "dtolnay"
170 user-name = "David Tolnay"
172 [[publisher.encoding_rs]]
176 user-login = "hsivonen"
177 user-name = "Henri Sivonen"
183 user-login = "sunfishcode"
184 user-name = "Dan Gohman"
186 [[publisher.etagere]]
191 user-name = "Nicolas Silva"
198 user-name = "Nicolas Silva"
204 user-login = "joshtriplett"
205 user-name = "Josh Triplett"
207 [[publisher.freetype]]
212 user-name = "Josh Matthews"
218 user-login = "jrmuizel"
219 user-name = "Jeff Muizelaar"
225 user-login = "badboy"
226 user-name = "Jan-Erik Rediger"
228 [[publisher.glean-core]]
232 user-login = "badboy"
233 user-name = "Jan-Erik Rediger"
235 [[publisher.glslopt]]
239 user-login = "jamienicol"
240 user-name = "Jamie Nicol"
242 [[publisher.glslopt]]
246 user-login = "jamienicol"
247 user-name = "Jamie Nicol"
253 user-login = "seanmonstar"
254 user-name = "Sean McArthur"
256 [[publisher.headers]]
260 user-login = "seanmonstar"
261 user-name = "Sean McArthur"
263 [[publisher.httparse]]
267 user-login = "seanmonstar"
268 user-name = "Sean McArthur"
270 [[publisher.indexmap]]
274 user-login = "cuviper"
275 user-name = "Josh Stone"
277 [[publisher.inherent]]
281 user-login = "dtolnay"
282 user-name = "David Tolnay"
288 user-login = "carllerche"
289 user-name = "Carl Lerche"
295 user-login = "dtolnay"
296 user-name = "David Tolnay"
298 [[publisher.jobserver]]
302 user-login = "alexcrichton"
303 user-name = "Alex Crichton"
309 user-login = "JohnTitor"
310 user-name = "Yuki Okushi"
312 [[publisher.linux-raw-sys]]
316 user-login = "sunfishcode"
317 user-name = "Dan Gohman"
319 [[publisher.lock_api]]
323 user-login = "Amanieu"
324 user-name = "Amanieu d'Antras"
330 user-login = "BurntSushi"
331 user-name = "Andrew Gallant"
337 user-login = "seanmonstar"
338 user-name = "Sean McArthur"
344 user-login = "carllerche"
345 user-name = "Carl Lerche"
347 [[publisher.nss-gk-api]]
351 user-login = "jschanck"
352 user-name = "John Schanck"
354 [[publisher.num_cpus]]
358 user-login = "seanmonstar"
359 user-name = "Sean McArthur"
365 user-login = "martinthomson"
366 user-name = "Martin Thomson"
368 [[publisher.ordered-float]]
372 user-login = "mbrubeck"
373 user-name = "Matt Brubeck"
375 [[publisher.parking_lot]]
379 user-login = "Amanieu"
380 user-name = "Amanieu d'Antras"
382 [[publisher.parking_lot_core]]
386 user-login = "Amanieu"
387 user-name = "Amanieu d'Antras"
393 user-login = "dtolnay"
394 user-name = "David Tolnay"
396 [[publisher.presser]]
400 user-login = "embark-studios"
406 user-login = "divviup-github-automation"
408 [[publisher.proc-macro2]]
412 user-login = "dtolnay"
413 user-name = "David Tolnay"
419 user-login = "jrmuizel"
420 user-name = "Jeff Muizelaar"
426 user-login = "dtolnay"
427 user-name = "David Tolnay"
433 user-login = "BurntSushi"
434 user-name = "Andrew Gallant"
436 [[publisher.regex-automata]]
440 user-login = "BurntSushi"
441 user-name = "Andrew Gallant"
443 [[publisher.regex-syntax]]
447 user-login = "BurntSushi"
448 user-name = "Andrew Gallant"
450 [[publisher.rust_cascade]]
454 user-login = "mozkeeler"
455 user-name = "Dana Keeler"
461 user-login = "sunfishcode"
462 user-name = "Dan Gohman"
468 user-login = "dtolnay"
469 user-name = "David Tolnay"
471 [[publisher.same-file]]
475 user-login = "BurntSushi"
476 user-name = "Andrew Gallant"
478 [[publisher.scopeguard]]
482 user-login = "Amanieu"
483 user-name = "Amanieu d'Antras"
489 user-login = "dtolnay"
490 user-name = "David Tolnay"
496 user-login = "dtolnay"
497 user-name = "David Tolnay"
499 [[publisher.serde_bytes]]
503 user-login = "dtolnay"
504 user-name = "David Tolnay"
506 [[publisher.serde_derive]]
510 user-login = "dtolnay"
511 user-name = "David Tolnay"
513 [[publisher.serde_derive]]
517 user-login = "dtolnay"
518 user-name = "David Tolnay"
520 [[publisher.serde_json]]
524 user-login = "dtolnay"
525 user-name = "David Tolnay"
527 [[publisher.serde_repr]]
531 user-login = "dtolnay"
532 user-name = "David Tolnay"
534 [[publisher.serde_yaml]]
538 user-login = "dtolnay"
539 user-name = "David Tolnay"
541 [[publisher.smallvec]]
545 user-login = "mbrubeck"
546 user-name = "Matt Brubeck"
548 [[publisher.smallvec]]
552 user-login = "mbrubeck"
553 user-name = "Matt Brubeck"
559 user-login = "dtolnay"
560 user-name = "David Tolnay"
562 [[publisher.termcolor]]
566 user-login = "BurntSushi"
567 user-name = "Andrew Gallant"
569 [[publisher.thiserror]]
573 user-login = "dtolnay"
574 user-name = "David Tolnay"
576 [[publisher.thiserror]]
580 user-login = "dtolnay"
581 user-name = "David Tolnay"
583 [[publisher.thiserror-impl]]
587 user-login = "dtolnay"
588 user-name = "David Tolnay"
590 [[publisher.thiserror-impl]]
594 user-login = "dtolnay"
595 user-name = "David Tolnay"
597 [[publisher.threadbound]]
601 user-login = "dtolnay"
602 user-name = "David Tolnay"
604 [[publisher.tokio-util]]
608 user-login = "Darksonn"
609 user-name = "Alice Ryhl"
615 user-login = "alexcrichton"
616 user-name = "Alex Crichton"
618 [[publisher.unicode-ident]]
622 user-login = "dtolnay"
623 user-name = "David Tolnay"
625 [[publisher.unicode-width]]
629 user-login = "Manishearth"
630 user-name = "Manish Goregaokar"
632 [[publisher.unicode-xid]]
636 user-login = "Manishearth"
637 user-name = "Manish Goregaokar"
645 [[publisher.uniffi_bindgen]]
651 [[publisher.uniffi_build]]
657 [[publisher.uniffi_checksum_derive]]
663 [[publisher.uniffi_core]]
669 [[publisher.uniffi_macros]]
675 [[publisher.uniffi_meta]]
681 [[publisher.uniffi_testing]]
687 [[publisher.uniffi_udl]]
693 [[publisher.utf8_iter]]
697 user-login = "hsivonen"
698 user-name = "Henri Sivonen"
700 [[publisher.walkdir]]
704 user-login = "BurntSushi"
705 user-name = "Andrew Gallant"
711 user-login = "seanmonstar"
712 user-name = "Sean McArthur"
715 version = "0.11.0+wasi-snapshot-preview1"
718 user-login = "alexcrichton"
719 user-name = "Alex Crichton"
721 [[publisher.wasm-encoder]]
725 user-login = "alexcrichton"
726 user-name = "Alex Crichton"
728 [[publisher.wasm-smith]]
732 user-login = "alexcrichton"
733 user-name = "Alex Crichton"
739 user-login = "alexcrichton"
740 user-name = "Alex Crichton"
742 [[publisher.winapi-util]]
746 user-login = "BurntSushi"
747 user-name = "Andrew Gallant"
749 [[publisher.windows]]
753 user-login = "kennykerr"
754 user-name = "Kenny Kerr"
756 [[publisher.windows-core]]
760 user-login = "kennykerr"
761 user-name = "Kenny Kerr"
763 [[publisher.windows-sys]]
767 user-login = "kennykerr"
768 user-name = "Kenny Kerr"
770 [[publisher.zeitstempel]]
774 user-login = "badboy"
775 user-name = "Jan-Erik Rediger"
777 [[audits.bytecode-alliance.wildcard-audits.arbitrary]]
778 who = "Nick Fitzgerald <fitzgen@gmail.com>"
779 criteria = "safe-to-deploy"
780 user-id = 696 # Nick Fitzgerald (fitzgen)
783 notes = "I am an author of this crate."
785 [[audits.bytecode-alliance.wildcard-audits.derive_arbitrary]]
786 who = "Nick Fitzgerald <fitzgen@gmail.com>"
787 criteria = "safe-to-deploy"
788 user-id = 696 # Nick Fitzgerald (fitzgen)
791 notes = "I am an author of this crate"
793 [[audits.bytecode-alliance.wildcard-audits.wasm-encoder]]
794 who = "Alex Crichton <alex@alexcrichton.com>"
795 criteria = "safe-to-deploy"
796 user-id = 1 # Alex Crichton (alexcrichton)
800 This is a Bytecode Alliance authored crate maintained in the `wasm-tools`
801 repository of which I'm one of the primary maintainers and publishers for.
802 I am employed by a member of the Bytecode Alliance and plan to continue doing
803 so and will actively maintain this crate over time.
806 [[audits.bytecode-alliance.wildcard-audits.wasm-smith]]
807 who = "Alex Crichton <alex@alexcrichton.com>"
808 criteria = "safe-to-deploy"
809 user-id = 1 # Alex Crichton (alexcrichton)
813 This is a Bytecode Alliance authored crate maintained in the `wasm-tools`
814 repository of which I'm one of the primary maintainers and publishers for.
815 I am employed by a member of the Bytecode Alliance and plan to continue doing
816 so and will actively maintain this crate over time.
819 [[audits.bytecode-alliance.wildcard-audits.wast]]
820 who = "Alex Crichton <alex@alexcrichton.com>"
821 criteria = "safe-to-deploy"
822 user-id = 1 # Alex Crichton (alexcrichton)
826 This is a Bytecode Alliance authored crate maintained in the `wasm-tools`
827 repository of which I'm one of the primary maintainers and publishers for.
828 I am employed by a member of the Bytecode Alliance and plan to continue doing
829 so and will actively maintain this crate over time.
832 [[audits.bytecode-alliance.audits.adler]]
833 who = "Alex Crichton <alex@alexcrichton.com>"
834 criteria = "safe-to-deploy"
836 notes = "This is a small crate which forbids unsafe code and is a straightforward implementation of the adler hashing algorithm."
838 [[audits.bytecode-alliance.audits.arrayref]]
839 who = "Nick Fitzgerald <fitzgen@gmail.com>"
840 criteria = "safe-to-deploy"
843 Unsafe code, but its logic looks good to me. Necessary given what it is
844 doing. Well tested, has quickchecks.
847 [[audits.bytecode-alliance.audits.arrayvec]]
848 who = "Nick Fitzgerald <fitzgen@gmail.com>"
849 criteria = "safe-to-deploy"
852 Well documented invariants, good assertions for those invariants in unsafe code,
853 and tested with MIRI to boot. LGTM.
856 [[audits.bytecode-alliance.audits.base64]]
857 who = "Pat Hickey <phickey@fastly.com>"
858 criteria = "safe-to-deploy"
860 notes = "This crate has no dependencies, no build.rs, and contains no unsafe code."
862 [[audits.bytecode-alliance.audits.bitflags]]
863 who = "Jamey Sharp <jsharp@fastly.com>"
864 criteria = "safe-to-deploy"
865 delta = "2.1.0 -> 2.2.1"
867 This version adds unsafe impls of traits from the bytemuck crate when built
868 with that library enabled, but I believe the impls satisfy the documented
869 safety requirements for bytemuck. The other changes are minor.
872 [[audits.bytecode-alliance.audits.bitflags]]
873 who = "Alex Crichton <alex@alexcrichton.com>"
874 criteria = "safe-to-deploy"
875 delta = "2.3.2 -> 2.3.3"
877 Nothing outside the realm of what one would expect from a bitflags generator,
881 [[audits.bytecode-alliance.audits.block-buffer]]
882 who = "Benjamin Bouvier <public@benj.me>"
883 criteria = "safe-to-deploy"
884 delta = "0.9.0 -> 0.10.2"
886 [[audits.bytecode-alliance.audits.bumpalo]]
887 who = "Nick Fitzgerald <fitzgen@gmail.com>"
888 criteria = "safe-to-deploy"
890 notes = "I am the author of this crate."
892 [[audits.bytecode-alliance.audits.cargo-platform]]
893 who = "Pat Hickey <phickey@fastly.com>"
894 criteria = "safe-to-deploy"
896 notes = "no build, no ambient capabilities, no unsafe"
898 [[audits.bytecode-alliance.audits.cc]]
899 who = "Alex Crichton <alex@alexcrichton.com>"
900 criteria = "safe-to-deploy"
902 notes = "I am the author of this crate."
904 [[audits.bytecode-alliance.audits.cfg-if]]
905 who = "Alex Crichton <alex@alexcrichton.com>"
906 criteria = "safe-to-deploy"
908 notes = "I am the author of this crate."
910 [[audits.bytecode-alliance.audits.codespan-reporting]]
911 who = "Jamey Sharp <jsharp@fastly.com>"
912 criteria = "safe-to-deploy"
914 notes = "This library uses `forbid(unsafe_code)` and has no filesystem or network I/O."
916 [[audits.bytecode-alliance.audits.cpufeatures]]
917 who = "Alex Crichton <alex@alexcrichton.com>"
918 criteria = "safe-to-deploy"
919 delta = "0.2.2 -> 0.2.7"
921 This is a minor update that looks to add some more detected CPU features and
922 various other minor portability fixes such as MIRI support.
925 [[audits.bytecode-alliance.audits.crypto-common]]
926 who = "Benjamin Bouvier <public@benj.me>"
927 criteria = "safe-to-deploy"
930 [[audits.bytecode-alliance.audits.fallible-iterator]]
931 who = "Alex Crichton <alex@alexcrichton.com>"
932 criteria = "safe-to-deploy"
933 delta = "0.2.0 -> 0.3.0"
935 This major version update has a few minor breaking changes but everything
936 this crate has to do with iterators and `Result` and such. No `unsafe` or
937 anything like that, all looks good.
940 [[audits.bytecode-alliance.audits.foreign-types]]
941 who = "Pat Hickey <phickey@fastly.com>"
942 criteria = "safe-to-deploy"
944 notes = "This crate defined a macro-rules which creates wrappers working with FFI types. The implementation of this crate appears to be safe, but each use of this macro would need to be vetted for correctness as well."
946 [[audits.bytecode-alliance.audits.foreign-types-shared]]
947 who = "Pat Hickey <phickey@fastly.com>"
948 criteria = "safe-to-deploy"
951 [[audits.bytecode-alliance.audits.futures-channel]]
952 who = "Pat Hickey <phickey@fastly.com>"
953 criteria = "safe-to-deploy"
955 notes = "build.rs is just detecting the target and setting cfg. unsafety is for implementing a concurrency primitives using atomics and unsafecell, and is not obviously incorrect (this is the sort of thing I wouldn't certify as correct without formal methods)"
957 [[audits.bytecode-alliance.audits.futures-core]]
958 who = "Pat Hickey <phickey@fastly.com>"
959 criteria = "safe-to-deploy"
961 notes = "Unsafe used to implement a concurrency primitive AtomicWaker. Well-commented and not obviously incorrect. Like my other audits of these concurrency primitives inside the futures family, I couldn't certify that it is correct without formal methods, but that is out of scope for this vetting."
963 [[audits.bytecode-alliance.audits.futures-executor]]
964 who = "Pat Hickey <phickey@fastly.com>"
965 criteria = "safe-to-deploy"
967 notes = "Unsafe used to implement the unpark mutex, which is well commented and not obviously incorrect. Like with futures-channel I wouldn't be able to certify it as correct without formal methods."
969 [[audits.bytecode-alliance.audits.futures-io]]
970 who = "Pat Hickey <phickey@fastly.com>"
971 criteria = "safe-to-deploy"
974 [[audits.bytecode-alliance.audits.futures-sink]]
975 who = "Pat Hickey <phickey@fastly.com>"
976 criteria = "safe-to-deploy"
979 [[audits.bytecode-alliance.audits.heck]]
980 who = "Alex Crichton <alex@alexcrichton.com>"
981 criteria = "safe-to-deploy"
983 notes = "Contains `forbid_unsafe` and only uses `std::fmt` from the standard library. Otherwise only contains string manipulation."
985 [[audits.bytecode-alliance.audits.id-arena]]
986 who = "Nick Fitzgerald <fitzgen@gmail.com>"
987 criteria = "safe-to-deploy"
989 notes = "I am the author of this crate."
991 [[audits.bytecode-alliance.audits.idna]]
992 who = "Alex Crichton <alex@alexcrichton.com>"
993 criteria = "safe-to-deploy"
996 This is a crate without unsafe code or usage of the standard library. The large
997 size of this crate comes from the large generated unicode tables file. This
998 crate is broadly used throughout the ecosystem and does not contain anything
1002 [[audits.bytecode-alliance.audits.leb128]]
1003 who = "Nick Fitzgerald <fitzgen@gmail.com>"
1004 criteria = "safe-to-deploy"
1006 notes = "I am the author of this crate."
1008 [[audits.bytecode-alliance.audits.memoffset]]
1009 who = "Alex Crichton <alex@alexcrichton.com>"
1010 criteria = "safe-to-deploy"
1011 delta = "0.7.1 -> 0.8.0"
1012 notes = "This was a small update to the crate which has to do with Rust language features and compiler versions, no substantial changes."
1014 [[audits.bytecode-alliance.audits.miniz_oxide]]
1015 who = "Alex Crichton <alex@alexcrichton.com>"
1016 criteria = "safe-to-deploy"
1019 This crate is a Rust implementation of zlib compression/decompression and has
1020 been used by default by the Rust standard library for quite some time. It's also
1021 a default dependency of the popular `backtrace` crate for decompressing debug
1022 information. This crate forbids unsafe code and does not otherwise access system
1023 resources. It's originally a port of the `miniz.c` library as well, and given
1024 its own longevity should be relatively hardened against some of the more common
1025 compression-related issues.
1028 [[audits.bytecode-alliance.audits.mio]]
1029 who = "Alex Crichton <alex@alexcrichton.com>"
1030 criteria = "safe-to-deploy"
1031 delta = "0.8.6 -> 0.8.8"
1032 notes = "Mostly OS portability updates along with some minor bugfixes."
1034 [[audits.bytecode-alliance.audits.object]]
1035 who = "Alex Crichton <alex@alexcrichton.com>"
1036 criteria = "safe-to-deploy"
1037 delta = "0.30.3 -> 0.31.1"
1038 notes = "A large-ish update to the crate but nothing out of the ordering. Support for new formats like xcoff, new constants, minor refactorings, etc. Nothing out of the ordinary."
1040 [[audits.bytecode-alliance.audits.object]]
1041 who = "Alex Crichton <alex@alexcrichton.com>"
1042 criteria = "safe-to-deploy"
1043 delta = "0.31.1 -> 0.32.0"
1044 notes = "Various new features and refactorings as one would expect from an object parsing crate, all looks good."
1046 [[audits.bytecode-alliance.audits.percent-encoding]]
1047 who = "Alex Crichton <alex@alexcrichton.com>"
1048 criteria = "safe-to-deploy"
1051 This crate is a single-file crate that does what it says on the tin. There are
1052 a few `unsafe` blocks related to utf-8 validation which are locally verifiable
1053 as correct and otherwise this crate is good to go.
1056 [[audits.bytecode-alliance.audits.pin-utils]]
1057 who = "Pat Hickey <phickey@fastly.com>"
1058 criteria = "safe-to-deploy"
1061 [[audits.bytecode-alliance.audits.pkg-config]]
1062 who = "Pat Hickey <phickey@fastly.com>"
1063 criteria = "safe-to-deploy"
1065 notes = "This crate shells out to the pkg-config executable, but it appears to sanitize inputs reasonably."
1067 [[audits.bytecode-alliance.audits.rustc-demangle]]
1068 who = "Alex Crichton <alex@alexcrichton.com>"
1069 criteria = "safe-to-deploy"
1071 notes = "I am the author of this crate."
1073 [[audits.bytecode-alliance.audits.semver]]
1074 who = "Pat Hickey <phickey@fastly.com>"
1075 criteria = "safe-to-deploy"
1077 notes = "plenty of unsafe pointer and vec tricks, but in well-structured and commented code that appears to be correct"
1079 [[audits.bytecode-alliance.audits.slab]]
1080 who = "Pat Hickey <phickey@fastly.com>"
1081 criteria = "safe-to-deploy"
1083 notes = "provides a datastructure implemented using std's Vec. all uses of unsafe are just delegating to the underlying unsafe Vec methods."
1085 [[audits.bytecode-alliance.audits.socket2]]
1086 who = "Alex Crichton <alex@alexcrichton.com>"
1087 criteria = "safe-to-deploy"
1088 delta = "0.4.7 -> 0.4.9"
1089 notes = "Minor OS compat updates but otherwise nothing major here."
1091 [[audits.bytecode-alliance.audits.tempfile]]
1092 who = "Pat Hickey <phickey@fastly.com>"
1093 criteria = "safe-to-deploy"
1094 delta = "3.3.0 -> 3.5.0"
1096 [[audits.bytecode-alliance.audits.tempfile]]
1097 who = "Alex Crichton <alex@alexcrichton.com>"
1098 criteria = "safe-to-deploy"
1099 delta = "3.5.0 -> 3.6.0"
1100 notes = "Dependency updates and new optimized trait implementations, but otherwise everything looks normal."
1102 [[audits.bytecode-alliance.audits.unicase]]
1103 who = "Alex Crichton <alex@alexcrichton.com>"
1104 criteria = "safe-to-deploy"
1107 This crate contains no `unsafe` code and no unnecessary use of the standard
1111 [[audits.bytecode-alliance.audits.unicode-bidi]]
1112 who = "Alex Crichton <alex@alexcrichton.com>"
1113 criteria = "safe-to-deploy"
1116 This crate has no unsafe code and does not use `std::*`. Skimming the crate it
1117 does not attempt to out of the bounds of what it's already supposed to be doing.
1120 [[audits.bytecode-alliance.audits.unicode-normalization]]
1121 who = "Alex Crichton <alex@alexcrichton.com>"
1122 criteria = "safe-to-deploy"
1125 This crate contains one usage of `unsafe` which I have manually checked to see
1126 it as correct. This crate's size comes in large part due to the generated
1127 unicode tables that it contains. This crate is additionally widely used
1128 throughout the ecosystem and skimming the crate shows no usage of `std::*` APIs
1129 and nothing suspicious.
1132 [[audits.embark-studios.wildcard-audits.presser]]
1133 who = "Gray Olson <opensource@embark-studios.com>"
1134 criteria = "safe-to-deploy"
1135 user-id = 52553 # embark-studios
1136 start = "2021-01-01"
1139 Small crate with no dependencies and no ambient capabilities. The safe interface of the crate
1140 is gated behind unsafe implementation of a core trait, and care must be taken to ensure that
1141 the relevant invariants are guaranteed when doing so. Maintained by the Ark team at Embark
1142 and used in production.
1145 [[audits.embark-studios.audits.anyhow]]
1146 who = "Johan Andersson <opensource@embark-studios.com>"
1147 criteria = "safe-to-deploy"
1150 [[audits.embark-studios.audits.cfg_aliases]]
1151 who = "Johan Andersson <opensource@embark-studios.com>"
1152 criteria = "safe-to-deploy"
1154 notes = "No unsafe usage or ambient capabilities"
1156 [[audits.embark-studios.audits.derive_more]]
1157 who = "Johan Andersson <opensource@embark-studios.com>"
1158 criteria = "safe-to-deploy"
1160 notes = "No unsafe usage or ambient capabilities"
1162 [[audits.embark-studios.audits.ident_case]]
1163 who = "Johan Andersson <opensource@embark-studios.com>"
1164 criteria = "safe-to-deploy"
1166 notes = "No unsafe usage or ambient capabilities"
1168 [[audits.embark-studios.audits.idna]]
1169 who = "Johan Andersson <opensource@embark-studios.com>"
1170 criteria = "safe-to-deploy"
1171 delta = "0.3.0 -> 0.4.0"
1172 notes = "No unsafe usage or ambient capabilities"
1174 [[audits.embark-studios.audits.line-wrap]]
1175 who = "Johan Andersson <opensource@embark-studios.com>"
1176 criteria = "safe-to-deploy"
1178 notes = "No unsafe usage or ambient capabilities"
1180 [[audits.embark-studios.audits.yaml-rust]]
1181 who = "Johan Andersson <opensource@embark-studios.com>"
1182 criteria = "safe-to-deploy"
1184 notes = "No unsafe usage or ambient capabilities"
1186 [[audits.google.audits.ash]]
1187 who = "David Koloski <dkoloski@google.com>"
1188 criteria = "safe-to-deploy"
1189 version = "0.37.0+1.3.209"
1190 notes = "Reviewed on https://fxrev.dev/694269"
1191 aggregated-from = "https://fuchsia.googlesource.com/fuchsia/+/refs/heads/main/third_party/rust_crates/supply-chain/audits.toml?format=TEXT"
1193 [[audits.google.audits.fastrand]]
1194 who = "George Burgess IV <gbiv@google.com>"
1195 criteria = "safe-to-deploy"
1198 `does-not-implement-crypto` is certified because this crate explicitly says
1199 that the RNG here is not cryptographically secure.
1201 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1203 [[audits.google.audits.futures]]
1204 who = "George Burgess IV <gbiv@google.com>"
1205 criteria = "safe-to-deploy"
1208 `futures` has no logic other than tests - it simply `pub use`s things from
1211 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1213 [[audits.google.audits.glob]]
1214 who = "George Burgess IV <gbiv@google.com>"
1215 criteria = "safe-to-deploy"
1217 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1219 [[audits.google.audits.http]]
1221 criteria = "safe-to-run"
1223 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1225 [[audits.google.audits.http-body]]
1227 criteria = "safe-to-run"
1229 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1231 [[audits.google.audits.httpdate]]
1233 criteria = "safe-to-run"
1235 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1237 [[audits.google.audits.hyper]]
1239 criteria = "safe-to-run"
1241 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1243 [[audits.google.audits.pin-project]]
1245 criteria = "safe-to-run"
1247 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1249 [[audits.google.audits.pin-project-internal]]
1251 criteria = "safe-to-run"
1253 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1255 [[audits.google.audits.pin-project-lite]]
1256 who = "David Koloski <dkoloski@google.com>"
1257 criteria = "safe-to-deploy"
1259 notes = "Reviewed on https://fxrev.dev/824504"
1260 aggregated-from = "https://fuchsia.googlesource.com/fuchsia/+/refs/heads/main/third_party/rust_crates/supply-chain/audits.toml?format=TEXT"
1262 [[audits.google.audits.scoped-tls]]
1263 who = "George Burgess IV <gbiv@google.com>"
1264 criteria = "safe-to-run"
1266 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1268 [[audits.google.audits.serde_urlencoded]]
1270 criteria = "safe-to-run"
1272 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1274 [[audits.google.audits.tokio]]
1275 who = "Vovo Yang <vovoy@google.com>"
1276 criteria = "safe-to-run"
1278 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1280 [[audits.google.audits.tokio-stream]]
1281 who = "David Koloski <dkoloski@google.com>"
1282 criteria = "safe-to-deploy"
1284 notes = "Reviewed on https://fxrev.dev/804724"
1285 aggregated-from = "https://fuchsia.googlesource.com/fuchsia/+/refs/heads/main/third_party/rust_crates/supply-chain/audits.toml?format=TEXT"
1287 [[audits.google.audits.tower-service]]
1289 criteria = "safe-to-run"
1291 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1293 [[audits.google.audits.tracing]]
1295 criteria = "safe-to-run"
1297 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1299 [[audits.google.audits.tracing-attributes]]
1301 criteria = "safe-to-run"
1303 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1305 [[audits.google.audits.tracing-core]]
1307 criteria = "safe-to-run"
1309 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1311 [[audits.google.audits.try-lock]]
1313 criteria = "safe-to-run"
1315 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1317 [[audits.google.audits.version_check]]
1318 who = "George Burgess IV <gbiv@google.com>"
1319 criteria = "safe-to-deploy"
1321 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1323 [[audits.google.audits.want]]
1325 criteria = "safe-to-run"
1327 aggregated-from = "https://chromium.googlesource.com/chromiumos/third_party/rust_crates/+/refs/heads/main/cargo-vet/audits.toml?format=TEXT"
1329 [[audits.isrg.wildcard-audits.prio]]
1330 who = "David Cook <dcook@divviup.org>"
1331 criteria = "safe-to-deploy"
1332 user-id = 213776 # divviup-github-automation
1333 start = "2020-09-28"
1336 [[audits.isrg.audits.base64]]
1337 who = "Tim Geoghegan <timg@letsencrypt.org>"
1338 criteria = "safe-to-deploy"
1339 delta = "0.21.0 -> 0.21.1"
1341 [[audits.isrg.audits.base64]]
1342 who = "Brandon Pitman <bran@bran.land>"
1343 criteria = "safe-to-deploy"
1344 delta = "0.21.1 -> 0.21.2"
1346 [[audits.isrg.audits.base64]]
1347 who = "David Cook <dcook@divviup.org>"
1348 criteria = "safe-to-deploy"
1349 delta = "0.21.2 -> 0.21.3"
1351 [[audits.isrg.audits.block-buffer]]
1352 who = "David Cook <dcook@divviup.org>"
1353 criteria = "safe-to-deploy"
1356 [[audits.isrg.audits.getrandom]]
1357 who = "Tim Geoghegan <timg@letsencrypt.org>"
1358 criteria = "safe-to-deploy"
1359 delta = "0.2.9 -> 0.2.10"
1360 notes = "These changes include some new `unsafe` code for the `emscripten` and `psvita` targets, but all it does is call `libc::getentropy`."
1362 [[audits.isrg.audits.keccak]]
1363 who = "David Cook <dcook@divviup.org>"
1364 criteria = "safe-to-deploy"
1367 [[audits.isrg.audits.keccak]]
1368 who = "Brandon Pitman <bran@bran.land>"
1369 criteria = "safe-to-deploy"
1370 delta = "0.1.3 -> 0.1.4"
1372 [[audits.isrg.audits.once_cell]]
1373 who = "Brandon Pitman <bran@bran.land>"
1374 criteria = "safe-to-deploy"
1375 delta = "1.17.1 -> 1.17.2"
1377 [[audits.isrg.audits.once_cell]]
1378 who = "David Cook <dcook@divviup.org>"
1379 criteria = "safe-to-deploy"
1380 delta = "1.17.2 -> 1.18.0"
1382 [[audits.isrg.audits.once_cell]]
1383 who = "Brandon Pitman <bran@bran.land>"
1384 criteria = "safe-to-deploy"
1385 delta = "1.18.0 -> 1.19.0"
1387 [[audits.isrg.audits.rand_chacha]]
1388 who = "David Cook <dcook@divviup.org>"
1389 criteria = "safe-to-deploy"
1392 [[audits.isrg.audits.rand_core]]
1393 who = "David Cook <dcook@divviup.org>"
1394 criteria = "safe-to-deploy"
1397 [[audits.isrg.audits.rayon-core]]
1398 who = "Brandon Pitman <bran@bran.land>"
1399 criteria = "safe-to-deploy"
1400 delta = "1.10.2 -> 1.11.0"
1402 [[audits.isrg.audits.rayon-core]]
1403 who = "David Cook <dcook@divviup.org>"
1404 criteria = "safe-to-deploy"
1405 delta = "1.11.0 -> 1.12.0"
1407 [[audits.isrg.audits.sha2]]
1408 who = "David Cook <dcook@divviup.org>"
1409 criteria = "safe-to-deploy"
1412 [[audits.isrg.audits.sha3]]
1413 who = "David Cook <dcook@divviup.org>"
1414 criteria = "safe-to-deploy"
1417 [[audits.isrg.audits.sha3]]
1418 who = "Brandon Pitman <bran@bran.land>"
1419 criteria = "safe-to-deploy"
1420 delta = "0.10.7 -> 0.10.8"
1422 [[audits.mozilla.wildcard-audits.zeitstempel]]
1423 who = "Jan-Erik Rediger <jrediger@mozilla.com>"
1424 criteria = "safe-to-deploy"
1425 user-id = 48 # Jan-Erik Rediger (badboy)
1426 start = "2021-03-03"
1428 notes = "Maintained by me"
1429 aggregated-from = "https://raw.githubusercontent.com/mozilla/glean/main/supply-chain/audits.toml"
1431 [[audits.mozilla.audits.askama]]
1432 who = "Jan-Erik Rediger <jrediger@mozilla.com>"
1433 criteria = "safe-to-deploy"
1434 delta = "0.11.1 -> 0.12.0"
1435 notes = "No new unsafe usage, mostly dependency updates and smaller API changes"
1436 aggregated-from = "https://raw.githubusercontent.com/mozilla/glean/main/supply-chain/audits.toml"
1438 [[audits.mozilla.audits.askama_derive]]
1439 who = "Jan-Erik Rediger <jrediger@mozilla.com>"
1440 criteria = "safe-to-deploy"
1441 delta = "0.11.2 -> 0.12.1"
1442 notes = "Dependency updates, a new toml dependency and some API changes. No unsafe use."
1443 aggregated-from = "https://raw.githubusercontent.com/mozilla/glean/main/supply-chain/audits.toml"
1445 [[audits.mozilla.audits.basic-toml]]
1446 who = "Jan-Erik Rediger <jrediger@mozilla.com>"
1447 criteria = "safe-to-deploy"
1449 notes = "TOML parser, forked from toml 0.5"
1450 aggregated-from = "https://raw.githubusercontent.com/mozilla/glean/main/supply-chain/audits.toml"
1452 [[audits.mozilla.audits.bitflags]]
1453 who = "Jan-Erik Rediger <jrediger@mozilla.com>"
1454 criteria = "safe-to-deploy"
1455 delta = "2.4.0 -> 2.4.1"
1456 notes = "Only allowing new clippy lints"
1457 aggregated-from = "https://raw.githubusercontent.com/mozilla/glean/main/supply-chain/audits.toml"
1459 [[audits.mozilla.audits.either]]
1460 who = "Nika Layzell <nika@thelayzells.com>"
1461 criteria = "safe-to-deploy"
1464 Straightforward crate providing the Either enum and trait implementations with
1467 aggregated-from = "https://raw.githubusercontent.com/mozilla/cargo-vet/main/supply-chain/audits.toml"
1469 [[audits.mozilla.audits.lazy_static]]
1470 who = "Nika Layzell <nika@thelayzells.com>"
1471 criteria = "safe-to-deploy"
1473 notes = "I have read over the macros, and audited the unsafe code."
1474 aggregated-from = "https://raw.githubusercontent.com/mozilla/cargo-vet/main/supply-chain/audits.toml"
1476 [[audits.mozilla.audits.log]]
1477 who = "Jan-Erik Rediger <jrediger@mozilla.com>"
1478 criteria = "safe-to-deploy"
1479 delta = "0.4.17 -> 0.4.18"
1480 notes = "One dependency removed, others updated (which we don't rely on), some APIs (which we don't use) changed."
1481 aggregated-from = "https://raw.githubusercontent.com/mozilla/glean/main/supply-chain/audits.toml"
1483 [[audits.mozilla.audits.log]]
1484 who = "Kagami Sascha Rosylight <krosylight@mozilla.com>"
1485 criteria = "safe-to-deploy"
1486 delta = "0.4.18 -> 0.4.20"
1487 notes = "Only cfg attribute and internal macro changes and module refactorings"
1488 aggregated-from = "https://raw.githubusercontent.com/mozilla/glean/main/supply-chain/audits.toml"
1490 [[audits.mozilla.audits.rkv]]
1491 who = "Kagami Sascha Rosylight <krosylight@mozilla.com>"
1492 criteria = "safe-to-deploy"
1493 delta = "0.18.4 -> 0.19.0"
1494 notes = "Maintained by Mozilla, no addition of unsafe blocks"
1495 aggregated-from = "https://raw.githubusercontent.com/mozilla/glean/main/supply-chain/audits.toml"