1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
# cargo-deny configuration
# https://embarkstudios.github.io/cargo-deny/
# ===========================================================================
# Advisories - Security vulnerability database checking
# ===========================================================================
[]
= "~/.cargo/advisory-db"
= ["https://github.com/rustsec/advisory-db"]
# Ignore specific advisories (add with justification)
= [
# fxhash - unmaintained, transitive dep from sled
"RUSTSEC-2025-0057",
# instant - unmaintained, transitive dep from sled and azure_* crates
"RUSTSEC-2024-0384",
# paste - unmaintained, transitive dep from parquet, foyer-storage, azure_core
"RUSTSEC-2024-0436",
# rustls-pemfile - unmaintained, transitive dep from object_store, bollard
"RUSTSEC-2025-0134",
# bincode - unmaintained, transitive dep from madsim (foyer/slatedb)
"RUSTSEC-2025-0141",
# tokio-tar - dev dependency only (testcontainers), no fix available
"RUSTSEC-2025-0111",
]
# ===========================================================================
# Licenses - Allowed license checking
# ===========================================================================
[]
= 0.8
# List of allowed licenses
= [
"MIT",
"Apache-2.0",
"Apache-2.0 WITH LLVM-exception",
"BSD-2-Clause",
"BSD-3-Clause",
"ISC",
"OpenSSL", # aws-lc-sys
"Zlib",
"0BSD",
"CC0-1.0",
"Unicode-DFS-2016",
"Unicode-3.0", # icu4x crates (yoke, zerofrom, zerovec, etc.)
"CDLA-Permissive-2.0", # webpki-roots
"BSL-1.0",
]
# Crates with clarifications
[[]]
= "ring"
= "MIT AND ISC AND OpenSSL"
= [
{ = "LICENSE", = 0xbd0eed23 },
]
[[]]
= "webpki"
= "ISC"
= [
{ = "LICENSE", = 0x001c7e6c },
]
# ===========================================================================
# Bans - Dependency bans and duplicates
# ===========================================================================
[]
= "warn"
= "allow" # Cargo doesn't support workspace inheritance with wildcards well
= "all"
# Deny specific problematic crates
= [
# Example: { name = "openssl" } # Prefer rustls
]
# Allow specific duplicates (with justification)
= [
# Common crates that often have multiple versions
# { name = "syn" },
]
# Skip tree for specific crates' dependencies
= [
# { name = "some-crate", version = "*" },
]
# ===========================================================================
# Sources - Allowed registry sources
# ===========================================================================
[]
= "deny"
= "deny"
# Allow crates.io (default)
= ["https://github.com/rust-lang/crates.io-index"]
# Allow specific git repositories (if needed)
= []
# ===========================================================================
# Output - How results are presented
# ===========================================================================
[]
= 1