This project might be open to known security vulnerabilities , which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom .
Crate alacritty
Dependencies (18 total, 3 outdated, 1 possibly insecure)
Dev dependencies (1 total, all up-to-date)
Build dependencies (1 total, all up-to-date)
Crate Required Latest Status gl_generator ^0.14.0
0.14.0
up to date
Crate alacritty_terminal
Dependencies (14 total, 4 outdated, 1 possibly insecure)
Dev dependencies (1 total, all up-to-date)
Crate Required Latest Status serde_json ^1.0.0
1.0.107
up to date
Crate alacritty_config
Dependencies (3 total, 1 outdated)
Crate Required Latest Status log ^0.4.17
0.4.20
up to date serde ^1.0.163
1.0.188
up to date toml ^0.7.1
0.8.0
out of date
Crate alacritty_config_derive
Dependencies (3 total, all up-to-date)
Crate Required Latest Status proc-macro2 ^1.0.24
1.0.67
up to date quote ^1.0.7
1.0.33
up to date syn ^2.0.16
2.0.37
up to date
Dev dependencies (3 total, 1 outdated)
Crate Required Latest Status log ^0.4.11
0.4.20
up to date serde ^1.0.117
1.0.188
up to date toml ^0.7.1
0.8.0
out of date
Security Vulnerabilities serde_yaml
: Uncontrolled recursion leads to abort in deserializationRUSTSEC-2018-0005
Affected versions of this crate did not properly check for recursion
while deserializing aliases.
This allows an attacker to make a YAML file with an alias referring
to itself causing an abort.
The flaw was corrected by checking the recursion depth.