1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
impl RustDefectDetector {
#[provable_contracts_macros::contract("pmat-core.yaml", equation = "check_compliance")]
/// Create a new instance.
pub fn new() -> Self {
Self {
unwrap_regex: Regex::new(r"\.unwrap\(\)").expect("internal error"),
}
}
/// Check if a file should be excluded from defect detection
fn should_exclude_file(&self, file_path: &Path) -> bool {
let path_str = file_path.to_string_lossy();
let file_name = file_path.file_name().and_then(|n| n.to_str()).unwrap_or("");
// Exclude test directories
if path_str.contains("/tests/")
|| path_str.starts_with("tests/")
|| path_str.contains("/benches/")
|| path_str.starts_with("benches/")
{
return true;
}
// Exclude examples directory (demos and samples often use .expect("internal error") for brevity)
if path_str.contains("/examples/")
|| path_str.starts_with("examples/")
|| path_str.starts_with("./examples/")
{
return true;
}
// Exclude fuzz targets (fuzz tests typically use .expect("internal error") for simplicity)
if path_str.contains("/fuzz/")
|| path_str.starts_with("fuzz/")
|| path_str.starts_with("./fuzz/")
{
return true;
}
// Exclude test file patterns
if file_name.ends_with("_tests.rs")
|| file_name.ends_with("_test.rs")
|| file_name.starts_with("test_")
{
return true;
}
false
}
/// Check if content contains test-related markers
fn has_test_markers(&self, content: &str) -> bool {
// Check for test cfg attributes
let has_cfg_test = content.contains("#[cfg(test)]")
|| content.contains("#[cfg(all(test,")
|| content.contains("#[cfg(any(test,");
// Check for test function attributes
let has_test_attr = content.contains("#[test]")
|| content.contains("#[tokio::test]")
|| content.contains("#[async_test]");
has_cfg_test || has_test_attr
}
/// Detect all defects in Rust source code
/// Returns vector of detected defect patterns with instances
#[provable_contracts_macros::contract("pmat-core.yaml", equation = "path_exists")]
pub fn detect(&self, content: &str, file_path: &Path) -> Vec<DefectPattern> {
let mut defects = Vec::new();
// Exclude test files entirely
if self.should_exclude_file(file_path) {
return defects;
}
// Exclude files with test markers
if self.has_test_markers(content) {
return defects;
}
// Detect .unwrap() calls
let unwrap_instances = self.detect_unwraps(content, file_path);
if !unwrap_instances.is_empty() {
defects.push(DefectPattern {
id: "RUST-UNWRAP-001".to_string(),
name: ".unwrap() calls".to_string(),
severity: Severity::Critical,
fix_recommendation:
"Use .expect() with descriptive messages or proper error handling with ?"
.to_string(),
bad_example: "let x = result.unwrap();".to_string(),
good_example: "let x = result.expect(\"Bot feature file must be valid\");"
.to_string(),
evidence_description: "Cloudflare outage 2025-11-18 (3+ hour network outage)"
.to_string(),
evidence_url: Some("https://blog.cloudflare.com/2025-01-18-outage".to_string()),
instances: unwrap_instances,
});
}
defects
}
fn detect_unwraps(&self, content: &str, file_path: &Path) -> Vec<DefectInstance> {
let mut instances = Vec::new();
// Track #[cfg(...)] blocks via brace depth so we can skip .unwrap()
// inside conditional compilation code (issue #279).
let mut brace_depth: i32 = 0;
let mut cfg_entry_depth: Option<i32> = None; // depth when #[cfg] was seen
let mut pending_cfg = false;
let mut in_block_comment = false;
for (line_num, line) in content.lines().enumerate() {
let trimmed = line.trim();
// Track block comments (simplified — no nesting)
if in_block_comment {
if trimmed.contains("*/") {
in_block_comment = false;
}
continue;
}
if trimmed.starts_with("/*") {
in_block_comment = !trimmed.contains("*/");
continue;
}
// Skip doc comments and line comments
if trimmed.starts_with("///")
|| trimmed.starts_with("//!")
|| trimmed.starts_with("//")
{
continue;
}
// Detect #[cfg(...)] attributes — marks the next braced item as cfg-gated
if trimmed.starts_with("#[cfg(") || trimmed.starts_with("#[cfg_attr(") {
pending_cfg = true;
}
// Track brace depth and cfg block boundaries
for ch in line.chars() {
if ch == '{' {
if pending_cfg && cfg_entry_depth.is_none() {
cfg_entry_depth = Some(brace_depth);
pending_cfg = false;
}
brace_depth += 1;
} else if ch == '}' {
brace_depth -= 1;
if let Some(entry) = cfg_entry_depth {
if brace_depth <= entry {
cfg_entry_depth = None;
}
}
}
}
// Skip .unwrap() detection inside #[cfg] blocks — conditional
// compilation code may use .unwrap() in feature-gated contexts
// where it's acceptable (e.g., GPU init, platform-specific code).
if cfg_entry_depth.is_some() {
continue;
}
// Strip string literal contents to avoid false positives on
// documentation strings like: "Detects .unwrap() panics"
let code_only = strip_string_literals(line);
for mat in self.unwrap_regex.find_iter(&code_only) {
instances.push(DefectInstance {
file: file_path.to_string_lossy().to_string(),
line: line_num + 1,
column: mat.start() + 1,
code_snippet: line.trim().to_string(),
});
}
}
instances
}
/// Count unwrap() calls (used by rust-project-score)
/// Skips comments and string literal contents to avoid false positives.
#[provable_contracts_macros::contract("pmat-core.yaml", equation = "check_compliance")]
pub fn count_unwraps(&self, content: &str) -> usize {
content
.lines()
.filter(|line| {
let trimmed = line.trim();
!trimmed.starts_with("//") && !trimmed.starts_with("/*") && !trimmed.is_empty()
})
.map(|line| {
let code = strip_string_literals(line);
self.unwrap_regex.find_iter(&code).count()
})
.sum()
}
}
impl Default for RustDefectDetector {
fn default() -> Self {
Self::new()
}
}
/// Strip contents of string literals to prevent false-positive defect detection.
/// Replaces `"..."` contents with spaces (preserving column offsets).
fn strip_string_literals(line: &str) -> String {
let bytes = line.as_bytes();
let len = bytes.len();
let mut out = Vec::with_capacity(len);
let mut i = 0;
while i < len {
if bytes[i] == b'"' {
out.push(b'"');
i += 1;
while i < len && bytes[i] != b'"' {
if bytes[i] == b'\\' && i + 1 < len {
out.push(b' ');
out.push(b' ');
i += 2;
} else {
out.push(b' ');
i += 1;
}
}
if i < len {
out.push(b'"');
i += 1;
}
} else {
out.push(bytes[i]);
i += 1;
}
}
String::from_utf8(out).unwrap_or_else(|_| line.to_string())
}