# A routine check to see if there are any Rust-specific security vulnerabilities in the repo we should be aware of. name: audit on: workflow_dispatch: schedule: - cron: "0 0 * * 1" jobs: audit: runs-on: ubuntu-latest steps: - uses: actions/checkout@v2 - uses: actions-rs/install@master with: crate: cargo-audit - uses: actions-rs/audit-check@35b7b53b1e25b55642157ac01b4adceb5b9ebef3 # 1.2.0 with: token: ${{ secrets.GITHUB_TOKEN }}