Skip to content

Add cargo audit to CI pipeline #183

@careck

Description

@careck

Security Review Recommendation

Source: Krillnotes Security Review v1.0.1 (April 2026)

Description

The security review identified 19 cargo audit warnings (all transitive via Tauri). While none are critical, running cargo audit in CI ensures new vulnerabilities are caught promptly.

Current State

  • 19 warnings: 17 unmaintained GTK3 bindings (Linux-only), 1 glib soundness (Linux-only), 1 rand soundness (indirect via Tauri)
  • 0 critical vulnerabilities

Recommendation

  • Add cargo audit as a CI step (advisory/non-blocking initially)
  • Establish response SLAs for vulnerability findings (e.g., critical = 48h, high = 1 week)
  • Consider cargo deny for more granular dependency policy

Acceptance Criteria

  • cargo audit runs in CI (can be advisory/non-blocking initially)
  • Response SLA documented

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or requestsecuritySecurity-related issues

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions