This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate snarkvm-dpc

Dependencies

(24 total, 18 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.0.421.0.98up to date
 base58^0.10.2.0out of date
 bech32^0.80.11.0out of date
 bincode^1.32.0.1out of date
 blake2^0.90.10.6out of date
 chrono ⚠️^0.40.4.41maybe insecure
 derivative^22.2.0up to date
 hex^0.4.30.4.3up to date
 itertools^0.10.10.14.0out of date
 once_cell^1.8.01.21.3up to date
 rand^0.80.9.1out of date
 serde^1.01.0.219up to date
 sha2^0.90.10.9out of date
 snarkvm-algorithms^0.7.93.8.0out of date
 snarkvm-curves^0.7.93.8.0out of date
 snarkvm-fields^0.7.93.8.0out of date
 snarkvm-gadgets^0.7.90.8.0out of date
 snarkvm-marlin^0.7.90.8.0out of date
 snarkvm-parameters^0.7.93.8.0out of date
 snarkvm-polycommit^0.7.90.8.0out of date
 snarkvm-profiler^0.7.90.8.0out of date
 snarkvm-r1cs^0.7.90.12.2out of date
 snarkvm-utilities^0.7.93.8.0out of date
 thiserror^1.02.0.12out of date

Dev dependencies

(1 total, 1 outdated)

CrateRequiredLatestStatus
 rand_chacha^0.30.9.0out of date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References