# A routine check to see if there are any Rust-specific security vulnerabilities in the repo we should be aware of. name: audit on: workflow_dispatch: schedule: - cron: "0 0 * * 1" jobs: audit: timeout-minutes: 18 runs-on: ubuntu-latest steps: - name: Checkout repository uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2 - name: Set up Rust toolchain uses: dtolnay/rust-toolchain@b44cb146d03e8d870c57ab64b80f04586349ca5d with: toolchain: stable - name: Enable Rust cache uses: Swatinem/rust-cache@988c164c3d0e93c4dbab36aaf5bbeb77425b2894 # 2.4.0 with: cache-targets: false cache-all-crates: true cache-on-failure: true - name: Install cargo-audit run: | cargo install cargo-audit --locked rm -rf ~/.cargo/registry || echo "no registry to delete" - uses: rustsec/audit-check@dd51754d4e59da7395a4cd9b593f0ff2d61a9b95 # v1.4.1 with: token: ${{ secrets.GITHUB_TOKEN }}