This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate ethsign

Dependencies

(8 total, 5 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 ethsign-crypto^0.2.10.3.0out of date
 libsecp256k1 ⚠️^0.3.10.7.1out of date
 parity-crypto^0.40.9.0out of date
 rand^0.7.00.8.5out of date
 rustc-hex^2.0.12.1.0up to date
 secp256k1^0.150.29.0out of date
 serde^1.01.0.200up to date
 zeroize^1.0.01.7.0up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 serde_json^1.01.0.116up to date

Security Vulnerabilities

libsecp256k1: libsecp256k1 allows overflowing signatures

RUSTSEC-2021-0076

libsecp256k1 accepts signatures whose R or S parameter is larger than the secp256k1 curve order, which differs from other implementations. This could lead to invalid signatures being verified.

The error is resolved in 0.5.0 by adding a check_overflow flag.