siderophile
Find the ideal fuzz targets in a Rust codebase (by trailofbits)
advisory-db
Security advisory database for Rust crates published through crates.io (by rustsec)
Our great sponsors
siderophile | advisory-db | |
---|---|---|
1 | 37 | |
185 | 829 | |
3.2% | 2.2% | |
5.8 | 9.2 | |
about 2 months ago | 8 days ago | |
Rust | ||
MIT License | GNU General Public License v3.0 or later |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
siderophile
Posts with mentions or reviews of siderophile.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-05-01.
-
Rust code quality and vulnerability scan tool
I'll go ahead and plug siderophile -- you can use it to find all the uses of unsafe in your codebase, and prioritize them for fuzzing, human review, etc.
advisory-db
Posts with mentions or reviews of advisory-db.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2024-03-26.
- Serde-YAML for Rust has been archived
- When Zig is safer and faster than Rust
-
Advisory: Miscompilation in cortex-m-rt 0.7.1 and 0.7.2
You might also want to add this to https://github.com/rustsec/advisory-db so that cargo audit and Dependabot surface it.
-
greater supply chain attack risk due to large dependency trees?
cargo-audit only checks for known issues reported to a vulnerability database.
- capnproto-rust: out-of-bound memory access bug
-
`cargo audit` can now scan compiled binaries
However, I keep getting this error when running cargo audit bin ~/.cargo/bin/*, even if I replace * with a specific binary: Fetching advisory database from `https://github.com/RustSec/advisory-db.git` Loaded 467 security advisories (from C:\Users\jonah\.cargo\advisory-db) Updating crates.io index error: I/O operation failed: The system cannot find the path specified. (os error 3) I'm on Windows 10.
-
Github Dependency graph adds vulnerability alerting support for Rust
FWIW the RustSec database is still not synced into the Github databse on a regular basis, even though they did an initial import of it. So the cargo audit github action is still relevant.
-
Hey Rustaceans! Got a question? Ask here! (18/2022)!
Removing prior log directory: ./target/cargo-checkmate/logs running 7 cargo-checkmate phases cargo-checkmate check... ok. cargo-checkmate format... ok. cargo-checkmate clippy... ok. cargo-checkmate build... ok. cargo-checkmate test... ok. cargo-checkmate doc... ok. cargo-checkmate audit... FAILED. failures: ---- cargo-checkmate audit ---- + ./target/cargo-checkmate/logs/audit.stdout: | Fetching advisory database from `https://github.com/RustSec/advisory-db.git` + ./target/cargo-checkmate/logs/audit.stderr: | thread 'main' panicked at 'called `Option::unwrap()` on a `None` value', /home/finn/.cargo/registry/src/github.com-1ecc6299db9ec823/cargo-checkmate-0.1.11/src/subcommands.rs:63:42 | note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace cargo-checkmate result: FAILED. 6 passed; 1 failed
-
Rust code quality and vulnerability scan tool
If that were true then https://github.com/RustSec/advisory-db/ would not exist.
-
Announcing s2n-quic 1.0
You are correct. Definitely not to pick on the other implementations but through casual testing we've seen all of them panic on messages received over the wire. I don't think any of them have disclosure policies in place and/or there was no advisory issued.
What are some alternatives?
When comparing siderophile and advisory-db you can also consider the following projects:
cargo-deny - ❌ Cargo plugin for linting your dependencies 🦀
chrono - Date and time library for Rust
vulndb - [mirror] The Go Vulnerability Database
rustsec - RustSec API & Tooling
dwflist - The DWF IDs
Rudra - Rust Memory Safety & Undefined Behavior Detection
treediff-rs - Extract differences between arbitrary datastructures
similar - A high level diffing library for rust based on diffs
project-safe-transmute - Project group working on the "safe transmute" feature
webpki - WebPKI X.509 Certificate Validation in Rust
rust - Empowering everyone to build reliable and efficient software.
rusqlite - Ergonomic bindings to SQLite for Rust