This project might be open to known security vulnerabilities , which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom .
Crate organism-intent No external dependencies! 🙌
Crate organism-planning No external dependencies! 🙌
Crate organism-adversarial No external dependencies! 🙌
Crate organism-simulation No external dependencies! 🙌
Crate organism-learning No external dependencies! 🙌
Crate organism-runtime No external dependencies! 🙌
Crate organism-intelligence Dependencies (8 total, all up-to-date)
Crate organism-domain Dependencies (2 total, all up-to-date)
Crate Required Latest Status serde ^11.0.228up to date serde_json ^11.0.149up to date
Crate organism-pack Dev dependencies (1 total, all up-to-date)
Crate Required Latest Status trybuild ^11.0.116up to date
Crate organism-notes Dependencies (2 total, all up-to-date)
Crate Required Latest Status base64 ^0.220.22.1up to date html2md ^0.20.2.15up to date
Crate example-vendor-selection Dependencies (4 total, 1 possibly insecure)
Crate example-formation-compiler No external dependencies! 🙌
Crate example-expense-approval Dependencies (6 total, 2 possibly insecure)
Crate example-loan-application Dependencies (6 total, 2 possibly insecure)
Crate example-resolution-showcase Dependencies (2 total, 1 possibly insecure)
Crate example-debate-loop Dependencies (7 total, 2 possibly insecure)
Crate example-collab-huddle No external dependencies! 🙌
Crate example-collab-panel No external dependencies! 🙌
Crate example-collab-self-organizing No external dependencies! 🙌
Crate example-collab-discussion No external dependencies! 🙌
Crate example-charter-from-intent Dependencies (1 total, 1 possibly insecure)
Crate Required Latest Status chrono ⚠️ ^0.40.4.44maybe insecure
Crate example-topology-transition Dependencies (1 total, 1 possibly insecure)
Crate Required Latest Status chrono ⚠️ ^0.40.4.44maybe insecure
Crate example-shape-competition Dependencies (2 total, 1 possibly insecure)
Crate Required Latest Status chrono ⚠️ ^0.40.4.44maybe insecure uuid ^11.23.1up to date
Security Vulnerabilities chrono: Potential segfault in `localtime_r` invocationsRUSTSEC-2020-0159
Impact
Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.
Workarounds
No workarounds are known.
References
tokio: reject_remote_clients Configuration corruptionRUSTSEC-2023-0001
On Windows, configuring a named pipe server with pipe_mode will force ServerOptions ::reject_remote_clients as false.
This drops any intended explicit configuration for the reject_remote_clients that may have been set as true previously.
The default setting of reject_remote_clients is normally true meaning the default is also overridden as false.
Workarounds
Ensure that pipe_mode is set first after initializing a ServerOptions . For example:
let mut opts = ServerOptions::new();
opts.pipe_mode(PipeMode::Message);
opts.reject_remote_clients(true);
Patched
>=1.18.4, <1.19.0
>=1.20.3, <1.21.0
>=1.23.1