Re-exports§
pub use dataflow::Assignment;pub use dataflow::MirDataflow;
Modules§
- dataflow
- interprocedural
- Inter-procedural taint analysis (Phase 3)
- memory_
profiler - Memory profiling utilities for debugging memory usage during analysis
- rules
- Security rules for Rust-cola static analysis.
Structs§
- Analysis
Result - Broadcast
Unsync Usage - Cache
Config - Cache
Metadata - Command
Invocation - Content
Length Allocation - Enriched
Package - Package with both MIR and source-level information
- Exploitability
- Exploitability metrics bundle (CVSS-like)
- Extraction
Artifacts - Finding
- Function
Fingerprint - Length
Truncation Cast - MirFunction
- MirFunction
HirMetadata - MirPackage
- Openssl
Verify None Invocation - Rule
Engine - Rule
Metadata - Source
File - Represents parsed source code for a Rust file
- Source
Span - Suppression
Rule
Enums§
- Attack
Complexity - Attack complexity - conditions beyond attacker’s control
- Attack
Vector - Attack vector - how the vulnerability can be exploited
- Cache
Miss Reason - Cache
Status - Code
Context - Code context classification for findings Used to categorize where a finding was detected, enabling filtering without data loss
- Confidence
- Confidence level for analysis findings
- Privileges
Required - Privileges required to exploit the vulnerability
- Rule
Origin - Severity
- Severity levels for security findings (CVSS-aligned)
- User
Interaction - Whether user interaction is required
Traits§
Functions§
- analyze
- analyze_
with_ engine - detect_
broadcast_ unsync_ payloads - detect_
command_ invocations - detect_
content_ length_ allocations - detect_
openssl_ verify_ none - detect_
truncating_ len_ casts - detect_
unbounded_ allocations - extract
- extract_
artifacts_ with_ cache - extract_
span_ from_ mir_ line - extract_
with_ cache - load_
cached_ analysis - sarif_
report - store_
cached_ analysis - write_
findings_ json - write_
mir_ json - write_
sarif_ json