Add GitHub Actions workflow for security audit#1583
Add GitHub Actions workflow for security audit#1583xtqqczze wants to merge 1 commit intobytecodealliance:mainfrom
Conversation
|
Is there any best-practices documentation about doing this kind of thing? It seems better to follow some existing process rather than to invent one for ourselves here. |
|
It's a GitHub Action maintained by the Rust Secure Code Working Group, see https://rustsec.org. |
|
Rustix is a library. Libraries don't need to do anything for patch-level and minor-level dependency updates. Major-level and switch-depemdencies updates are less common, and we'll get bug reports from users when they do happen. It would be slightly nicer if we didn't need to wait for those bug reports, but it's not clear that the maintainer burden is worth it. If there's a best practices doc that accounts for practical costs and practical benefits, I'm open to reading it. |
|
That link doesn't address my concerns. |
|
I am concerned that a daily audit will produce many notifications that don't require any action within rustix. I also assume that Rust library security updates that require major-version bumps or switching libraries are uncommon, and when they do happen, it's uncommon for them to be urgent. Consequently, I don't think it's worthwhile for rustix to run a daily audit. |
|
The changes in this PR would adjust the workflow so that advisories are surfaced but do not cause CI to fail, providing visibility into potential issues. As well as vulnerabilities, the action also reports unsoundness advisories. In the case of unsoundness, fixes are often not backported. For example, This was fixed in With Rust 1.63 dating back to August 2022, this is increasingly problematic: many crates have since raised their MSRV, and fixes, especially for unsoundness, often land only in new major versions. |
|
criterion is a dev-dependency in rustix. It's only used for If the script is set to produce no notifications, then I don't understand why it's important to do. If downstream users want to know about potential issues in their dependencies, they'll run cargo audit in their own CI anyway. Also, yes, we probably should bump the MSRV to something newer now. |
Action will be executed periodically at midnight of each day and check if any new advisories appear for crate dependencies.
For each new advisory (including informal) an issue will be created.