Comment by tison
1 year ago
I've updated the Gist with a full Cargo.lock file that can be audited - https://gist.github.com/tisonkun/06550d2dcd9cf6551887ee6305e...
Running cargo audit -n --json | jq -r '.vulnerabilities.list[] | (.advisory.id + " - " + .package.name)' gives:
RUSTSEC-2023-0071 - rsa
which is transitively introduced by sqlx-mysql while we don't use the MySQL driver in production.
No comments yet
Contribute on Hacker News ↗