1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
[]
= [
"x86_64-unknown-linux-gnu",
"aarch64-unknown-linux-gnu",
"x86_64-unknown-linux-musl",
"aarch64-apple-darwin",
"x86_64-apple-darwin",
"x86_64-pc-windows-msvc",
]
= true
[]
# Advisory database configuration
# Vulnerabilities and advisories are checked automatically when db-urls is set
= [
# RUSTSEC-2023-0071: rsa crate timing attack vulnerability
# Only used in dev-dependencies for testing, not in production code
{ = "RUSTSEC-2023-0071", = "rsa crate only used in dev-dependencies for tests, not in production" },
]
[]
# Confidence threshold for license detection (0.0-1.0)
= 0.8
# Explicitly allowed licenses
# Based on actual dependencies: MIT, Apache-2.0, BSD-3-Clause, ISC, OpenSSL, Unicode-3.0, CDLA-Permissive-2.0
= [
"MIT",
"Apache-2.0",
"BSD-3-Clause",
"ISC",
"OpenSSL",
"Unicode-3.0",
"CDLA-Permissive-2.0",
]
# Per-crate license exceptions
= []
[]
# Ignore workspace crates that aren't published to public registry
= false
[]
# Lint level for multiple versions of the same crate
= "warn"
# Lint level for wildcard version requirements (*)
= "deny"
# Graph highlighting for duplicate detection
= "all"
# Crates explicitly allowed
= []
# Crates explicitly denied
= []
# Crates to skip during duplicate detection
= []
[]
# Lint level for unknown registries
= "deny"
# Lint level for unknown git repositories
= "deny"
# Allowed crate registries (defaults to crates.io if not specified)
= ["https://github.com/rust-lang/crates.io-index"]
# Allowed git repositories
= []