Best way to protect a project from supply chain attacks?

This page summarizes the projects mentioned and recommended in the original post on /r/rust

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
  • cargo-crev

    A cryptographically verifiable code review system for the cargo (Rust) package manager.

  • Another mentioned https://github.com/crev-dev/cargo-crev but it seems like coverage isn't perfect and some versions of libraries covered by it are somewhat old.

  • cargo-supply-chain

    Gather author, contributor and publisher data on crates in your dependency graph.

  • cargo supply-chain to see your attack surface for supply chain attacks

  • WorkOS

    The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.

    WorkOS logo
  • cargo-vet

    supply-chain security for Rust

  • cargo crev and cargo vet for reviewing dependencies and using reviewed versions

  • cargo-deny

    ❌ Cargo plugin for linting your dependencies 🦀

  • cargo deny for fetching crates only from trusted sources, blacklisting crates, etc.

  • crates.io

    The Rust package registry

  • Your actions will depend on your specific risk factors/tolerances. If you want to protect against a compromised or turned-malicious crates.io, then vendoring or having your own mirror are the only real alternatives. But that's a decent amount of work for a stunningly unlikely problem.

  • dust

    A more intuitive version of du in rust

  • dust (https://github.com/bootandy/dust) made in Rust of course ;)

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts