Expand description
§dev-security
Security auditing for Rust. Wraps cargo-audit
(RustSec advisory database) and cargo-deny (license
- policy enforcement). Part of the
dev-*verification suite.
Output is a dev_report::Report so AI agents and CI gates can act
on findings programmatically.
§What it checks
- Vulnerabilities — known CVEs in your dependency tree (via
cargo-audit). - Licenses — license-policy compliance (via
cargo-deny). - Banned crates — explicit allow/deny lists (via
cargo-deny). - Source policies — registry/git source restrictions (via
cargo-deny).
§Quick example
use dev_security::{AuditRun, AuditScope};
let run = AuditRun::new("my-crate", "0.1.0").scope(AuditScope::All);
let result = run.execute().unwrap();
let report = result.into_report();§Requirements
cargo install cargo-audit cargo-denyThe crate detects absence of each tool and emits
AuditError::AuditToolNotInstalled or
AuditError::DenyToolNotInstalled without panicking.
Structs§
- Audit
Producer Produceradapter that runs anAuditRunand emits aReport.- Audit
Result - Result of an audit run.
- Audit
Run - Configuration for an audit run.
- Finding
- A single security finding.
Enums§
- Audit
Error - Errors that can arise during an audit run.
- Audit
Scope - Scope of an audit run.
- Finding
Source - Which tool emitted a
Finding.