This project might be open to known security vulnerabilities , which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom .
Crate alacritty
Dependencies (16 total, 2 outdated, 1 possibly insecure)
Dev dependencies (1 total, all up-to-date)
Build dependencies (1 total, all up-to-date)
Crate Required Latest Status gl_generator ^0.14.0
0.14.0
up to date
Crate alacritty_terminal
Dependencies (13 total, 3 outdated, 1 possibly insecure)
Dev dependencies (1 total, all up-to-date)
Crate Required Latest Status serde_json ^1.0.0
1.0.82
up to date
Crate alacritty_config_derive
Dependencies (3 total, all up-to-date)
Crate Required Latest Status syn ^1.0.53
1.0.98
up to date proc-macro2 ^1.0.24
1.0.40
up to date quote ^1.0.7
1.0.20
up to date
Dev dependencies (3 total, all up-to-date)
Crate Required Latest Status serde_yaml ^0.8.14
0.8.24
up to date serde ^1.0.117
1.0.138
up to date log ^0.4.11
0.4.17
up to date
Security Vulnerabilities serde_yaml
: Uncontrolled recursion leads to abort in deserializationRUSTSEC-2018-0005
Affected versions of this crate did not properly check for recursion
while deserializing aliases.
This allows an attacker to make a YAML file with an alias referring
to itself causing an abort.
The flaw was corrected by checking the recursion depth.