Crates.io | rust-audit-info |
lib.rs | rust-audit-info |
version | 0.5.4 |
source | src |
created_at | 2020-09-06 23:24:05.486238 |
updated_at | 2024-05-08 15:34:37.966754 |
description | Command-line tool to extract the dependency trees embedded in binaries by `cargo auditable`. |
homepage | |
repository | https://github.com/rust-secure-code/cargo-auditable |
max_upload_size | |
id | 285545 |
size | 7,789 |
Command-line tool to extract the dependency trees embedded in binaries by cargo auditable
.
It takes care of parsing the platform-specific formats (ELF, PE, Mach-O) and outputs the decompressed JSON.
This tool is intentionally minimal and does not implement vulnerability scanning on its own. However, it is useful for building your own vulnerability scanner. If you're looking for a Rust library instead of a command-line tool, see auditable-info
.
std
.Usage: rust-audit-info FILE [INPUT_SIZE_LIMIT] [OUTPUT_SIZE_LIMIT]
The limits are specified in bytes. The default values are:
INPUT_SIZE_LIMIT: 1073741824 (1 GiB)
OUTPUT_SIZE_LIMIT: 67108864 (64 MiB)
The highest possible RAM usage is INPUT_SIZE_LIMIT + OUTPUT_SIZE_LIMIT
, plus up to 1MB of overhead.
If you need to read from the standard input, pass /dev/stdin
as the FILE
.
$ cargo geiger
Metric output format: x/y
x = unsafe code used by the build
y = total unsafe code found in the crate
Symbols:
🔒 = No `unsafe` usage found, declares #![forbid(unsafe_code)]
❓ = No `unsafe` usage found, missing #![forbid(unsafe_code)]
☢️ = `unsafe` usage found
Functions Expressions Impls Traits Methods Dependency
0/0 0/0 0/0 0/0 0/0 🔒 rust-audit-info 0.5.2
0/0 0/0 0/0 0/0 0/0 🔒 └── auditable-info 0.6.2
0/0 0/0 0/0 0/0 0/0 🔒 ├── auditable-extract 0.3.2
0/0 0/0 0/0 0/0 0/0 🔒 │ └── binfarce 0.2.1
0/0 0/0 0/0 0/0 0/0 🔒 └── miniz_oxide 0.6.2
0/0 0/0 0/0 0/0 0/0 🔒 └── adler 1.0.2
0/0 0/0 0/0 0/0 0/0