Overview
Introduce a Rust dependency security workflow based on cargo audit that runs periodically and
can be triggered manually, document scan results under docs/security/dependencies, and remediate
vulnerabilities where feasible.
This task also defines a clear process for unresolved findings: if vulnerabilities cannot be fixed
quickly (e.g. blocked by upstream releases), create follow-up issues with context, impact, and tracking.
Specification
See detailed specification: docs/issues/439-cargo-audit-security-automation-and-remediation.md
Implementation Plan
Phase 1: CI Workflow Setup
Phase 2: Manual Security Reporting
Phase 3: Dependency Remediation
Phase 4: Follow-up Tracking
Acceptance Criteria
Note for Contributors: These criteria define what the PR reviewer will check. Use this as your pre-review checklist before submitting the PR to minimize back-and-forth iterations.
Quality Checks:
Task-Specific Criteria:
Related
Overview
Introduce a Rust dependency security workflow based on
cargo auditthat runs periodically andcan be triggered manually, document scan results under
docs/security/dependencies, and remediatevulnerabilities where feasible.
This task also defines a clear process for unresolved findings: if vulnerabilities cannot be fixed
quickly (e.g. blocked by upstream releases), create follow-up issues with context, impact, and tracking.
Specification
See detailed specification: docs/issues/439-cargo-audit-security-automation-and-remediation.md
Implementation Plan
Phase 1: CI Workflow Setup
.github/workflows/cargo-audit.ymlPhase 2: Manual Security Reporting
cargo auditmanually and capture resultsdocs/security/dependencies/index and date-stamped scan reportPhase 3: Dependency Remediation
cargo auditPhase 4: Follow-up Tracking
Acceptance Criteria
Quality Checks:
./scripts/pre-commit.shTask-Specific Criteria:
docs/security/dependencies/and follows documented formatcargo auditwas re-run and latest results are documentedRelated
.github/workflows/docker-security-scan.yml