cargo-auditable

Make production Rust binaries auditable (by rust-secure-code)

Cargo-auditable Alternatives

Similar projects and alternatives to cargo-auditable

  1. rust

    Empowering everyone to build reliable and efficient software.

  2. InfluxDB

    InfluxDB – Built for High-Performance Time Series Workloads. InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.

    InfluxDB logo
  3. rfcs

    688 cargo-auditable VS rfcs

    RFCs for changes to Rust

  4. crates.io

    The Rust package registry

  5. CppCoreGuidelines

    The C++ Core Guidelines are a set of tried-and-true guidelines, rules, and best practices about coding in C++

  6. Rustlings

    :crab: Small exercises to get you used to reading and writing Rust code!

  7. swift

    The Swift Programming Language

  8. cloudquery

    The developer first cloud governance platform

  9. SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
  10. trivy

    Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

  11. sccache

    Sccache is a ccache-like tool. It is used as a compiler wrapper and avoids compilation when possible. Sccache has the capability to utilize caching in remote storage environments, including various cloud storage options, or alternatively, in local storage.

  12. wasm-bindgen

    Facilitating high-level interactions between Wasm modules and JavaScript

  13. syft

    CLI tool and library for generating a Software Bill of Materials from container images and filesystems

  14. rustsec

    RustSec API & Tooling

  15. api-guidelines

    Rust API guidelines (by rust-lang)

  16. cargo-supply-chain

    Gather author, contributor and publisher data on crates in your dependency graph.

  17. cargo-dist

    📦 shippable application packaging

  18. opencv-rust

    Rust bindings for OpenCV

  19. cargo-update

    A cargo subcommand for checking and applying updates to installed executables

  20. auto-fuzz-test

    Effortlessly fuzz libraries with large API surfaces

  21. crane

    A Nix library for building cargo projects. Never build twice thanks to incremental artifact caching.

  22. fedimint

    Federated E-Cash Mint

  23. SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better cargo-auditable alternative or higher similarity.

cargo-auditable discussion

Log in or Post with

cargo-auditable reviews and mentions

Posts with mentions or reviews of cargo-auditable. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-05-04.
  • Rust Offline?
    9 projects | /r/rust | 4 May 2023
    Further we use cargo-auditable and cargo-audit as part of both our pipeline and regular scanning of all deployed services. This makes our InfoSec and Legal super happy since it means they can also monitor compliance with licenses and patch/update timings.
  • Hey Rustaceans! Got a question? Ask here (15/2023)!
    15 projects | /r/rust | 10 Apr 2023
    This exists, see cargo auditable.
  • The Rust Implementation Of GNU Coreutils Is Becoming Remarkably Robust
    2 projects | /r/rust | 12 Feb 2023
    The Rust community seems to have settled on a perfectly reasonable way to address bit-rot in statically linked binaries. https://github.com/rust-secure-code/cargo-auditable
  • Release Engineering Is Exhausting So Here's cargo-dist
    8 projects | /r/rust | 1 Feb 2023
    Would you be open to integrating cargo auditable into this pipeline in some form? It seems like a great match.
  • Swift Achieved Dynamic Linking Where Rust Couldn't
    10 projects | news.ycombinator.com | 29 Jan 2023
    > and static compilation probably just hides the problem unless security scanners these days can identify statically compiled vulnerable versions of libraries

    Some scanners like trivy [1] can scan statically compiled binaries, provided they include dependency version information (I think go does this on its own, for rust there's [2], not sure about other languages).

    It also looks into your containers.

    The problem is what to do when it finds a vulnerability. In a fat app with dynamic linking you could exchange the offending library, check that this doesn't break anything for your use case, and be on your way. But with static linking you need to compile a new version, or get whoever can build it to compile a new version. Which seems to be a major drawback of discouraging fat apps.

    1: https://github.com/aquasecurity/trivy

    2: https://github.com/rust-secure-code/cargo-auditable

  • 'cargo auditable' can now be used as a drop-in replacement for Cargo
    5 projects | /r/rust | 9 Dec 2022
    I have investigated a bunch of standardized formats - SPDX, CycloneDX, etc. All of them are unsuitable for a variety of reasons, chief of which are being way too verbose and including timestamps, which would break reproducible builds.
  • sccache now supports GHA as backend
    4 projects | /r/rust | 7 Dec 2022
    The fix for interoperability with cargo auditable has also shipped in the latest release of sccache. You can use the released sccache now instead of building it from git!
  • `cargo audit` can now scan compiled binaries
    6 projects | /r/rust | 2 Nov 2022
    I've been working to bring vulnerability scanning to Rust binaries by creating cargo auditable, which embeds the list of dependencies and their versions into the compiled binary. This lets you audit the binary you actually run, instead of the Cargo.lock file in some repo somewhere.
  • Here's how to patch the upcoming OpenSSL vulnerability in Rust
    2 projects | /r/rust | 30 Oct 2022
    cargo auditable solves this problem by embedding the list of dependencies and their versions into the binaries. But until it becomes part of Cargo and gets enabled by default, static linking will remain problematic.
  • Introducing cargo-auditable: audit Rust binaries for known bugs or vulnerabilities in production
    1 project | /r/rust | 15 Oct 2022
  • A note from our sponsor - InfluxDB
    www.influxdata.com | 15 May 2025
    InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now. Learn more →

Stats

Basic cargo-auditable repo stats
23
729
8.3
6 days ago

Sponsored
InfluxDB – Built for High-Performance Time Series Workloads
InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
www.influxdata.com

Did you know that Rust is
the 5th most popular programming language
based on number of references?