This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate Yoda

Dependencies

(17 total, 3 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 libadwaita^0.8.00.8.1up to date
 gtk4^0.10.00.10.3up to date
 rusqlite^0.37.00.38.0out of date
 sourceview5^0.10.00.10.0up to date
 ansi-parser^0.9.10.9.1up to date
 anyhow^1.0.971.0.100up to date
 ggemini^0.20.00.20.0up to date
 ggemtext^0.7.00.7.0up to date
 indexmap^2.10.02.13.0up to date
 itertools^0.14.00.14.0up to date
 libspelling^0.4.10.4.1up to date
 maxminddb ⚠️^0.26.00.27.1out of date
 openssl^0.10.720.10.75up to date
 plurify^0.2.00.2.0up to date
 r2d2^0.8.100.8.10up to date
 r2d2_sqlite^0.31.00.32.0out of date
 syntect^5.2.05.3.0up to date

Security Vulnerabilities

maxminddb: `Reader::open_mmap` unsoundly marks unsafe memmap operation as safe

RUSTSEC-2025-0132

maxminddb prior to version 0.27 declared Reader::open_mmap as safe despite wrapping an inherently unsafe memmap2 operation with no extra step done to guarantee safety. This could have led to undefined behaviour if the file were to be modified on disk while the memory map was still active.