Skip to content

Security: Tamschi/rust-template

Security

SECURITY.md

Security Policy

Supported Versions

Version Supported Initial Reason for Removal
0.0.1

Faulty versions are yanked, where possible after a Semver-compatible update is made available, and added to the table above as unsupported.
They are also marked with an additional v….….…-yanked tag in Git to make them easily recognisable, but original release tags are not removed.

Security advisories are published through the respective section on this repository here and RustSec/advisory-db.

Reporting a Vulnerability

If you find a security issue, please contact me privately first, so that I can publish a fix before the announcement!

You can reach me via XMPP or email at tamme@schichler.dev.
Prefer XMPP and mention "vulnerability" if you'd like an immediate response, though I can't always guarantee this of course.

Notes

As 0.0.z versions cannot be upgraded in a Semver-compatible way, these can be yanked without an automatically resolved alternative becoming available. Should it become impossible to fix a vulnerability in an API-compatible way, an x.….… or 0.y.… version can be yanked entirely, too.

Yanked versions are still available for download, so your builds will not break with an existing Cargo.lock file.
Please include it in your version control (and source release packages for executables). Cargo does this by default.

While there will be advisories about any security issues and undefined behaviour, other bugfix releases are more quiet.
To be notified automatically, either subscribe to releases through the repository watch feature on GitHub or use for example Dependabot with package-ecosystem: cargo. To check only for vulnerabilities, use cargo-audit instead, which is available as a GitHub Action as actions-rs/audit-check.

Once a version becomes yanked/unsupported, please update or upgrade to a supported version in a timely manner. I'll try to make this as painless as possible where manual changes are required, but a simple cargo update -p TODO_CRATE_NAME should do the trick in most cases.

There aren’t any published security advisories