| 123456789101112131415161718192021222324252627282930313233343536373839404142 |
- #!/usr/bin/env zx
- import 'zx/globals';
- const advisories = [
- // ed25519-dalek: Double Public Key Signing Function Oracle Attack
- //
- // Remove once repo upgrades to ed25519-dalek v2
- 'RUSTSEC-2022-0093',
- // curve25519-dalek
- //
- // Remove once repo upgrades to curve25519-dalek v4
- 'RUSTSEC-2024-0344',
- // Crate: tonic
- // Version: 0.9.2
- // Title: Remotely exploitable Denial of Service in Tonic
- // Date: 2024-10-01
- // ID: RUSTSEC-2024-0376
- // URL: https://rustsec.org/advisories/RUSTSEC-2024-0376
- // Solution: Upgrade to >=0.12.3
- 'RUSTSEC-2024-0376',
- // Crate: idna
- // Version: 0.1.5
- // Title: `idna` accepts Punycode labels that do not produce any non-ASCII when decoded
- // Date: 2024-12-09
- // ID: RUSTSEC-2024-0421
- // URL: https://rustsec.org/advisories/RUSTSEC-2024-0421
- // Solution: Upgrade to >=1.0.0
- // need to solve this dependency tree:
- // jsonrpc-core-client v18.0.0 -> jsonrpc-client-transports v18.0.0 -> url v1.7.2 -> idna v0.1.5
- 'RUSTSEC-2024-0421',
- ];
- const ignores = []
- advisories.forEach(x => {
- ignores.push('--ignore');
- ignores.push(x);
- });
- // Check Solana version.
- await $`cargo audit ${ignores}`;
|