[INFO] cloning repository https://github.com/MindPatch/Vulfy
[INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/MindPatch/Vulfy" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FMindPatch%2FVulfy", kill_on_drop: false }`
[INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FMindPatch%2FVulfy'...
[INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }`
[INFO] [stdout] 2c5a4bf587f47ea57b0491ca15f5a0b25efb35a5
[INFO] building MindPatch/Vulfy against master#c7f6aa2869acdbf014d094c6e427e554e160b6db for pr-146237-2
[INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FMindPatch%2FVulfy" "/workspace/builds/worker-1-tc1/source", kill_on_drop: false }`
[INFO] [stderr] Cloning into '/workspace/builds/worker-1-tc1/source'...
[INFO] [stderr] done.
[INFO] started tweaking git repo https://github.com/MindPatch/Vulfy
[INFO] finished tweaking git repo https://github.com/MindPatch/Vulfy
[INFO] tweaked toml for git repo https://github.com/MindPatch/Vulfy written to /workspace/builds/worker-1-tc1/source/Cargo.toml
[INFO] validating manifest of git repo https://github.com/MindPatch/Vulfy on toolchain c7f6aa2869acdbf014d094c6e427e554e160b6db
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c7f6aa2869acdbf014d094c6e427e554e160b6db" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate git repo https://github.com/MindPatch/Vulfy already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c7f6aa2869acdbf014d094c6e427e554e160b6db" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded cron v0.12.1
[INFO] [stderr]   Downloaded tokio-test v0.4.4
[INFO] [stderr]   Downloaded tokio-cron-scheduler v0.10.2
[INFO] [stderr]   Downloaded git2 v0.18.3
[INFO] [stderr]   Downloaded libssh2-sys v0.3.1
[INFO] [stderr]   Downloaded libgit2-sys v0.16.2+1.7.2
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+c7f6aa2869acdbf014d094c6e427e554e160b6db" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] eaad6b5954878c13a3adc215adad5fba04e3ef846c8f329ca3843aa0adac98e1
[INFO] running `Command { std: "docker" "start" "-a" "eaad6b5954878c13a3adc215adad5fba04e3ef846c8f329ca3843aa0adac98e1", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "eaad6b5954878c13a3adc215adad5fba04e3ef846c8f329ca3843aa0adac98e1", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "eaad6b5954878c13a3adc215adad5fba04e3ef846c8f329ca3843aa0adac98e1", kill_on_drop: false }`
[INFO] [stdout] eaad6b5954878c13a3adc215adad5fba04e3ef846c8f329ca3843aa0adac98e1
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+c7f6aa2869acdbf014d094c6e427e554e160b6db" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 3a0d5004e88ccedf27c835f44139b133cc1333841aebfa89ddd8a7acd27e083c
[INFO] running `Command { std: "docker" "start" "-a" "3a0d5004e88ccedf27c835f44139b133cc1333841aebfa89ddd8a7acd27e083c", kill_on_drop: false }`
[INFO] [stderr]    Compiling smallvec v1.15.1
[INFO] [stderr]    Compiling libc v0.2.174
[INFO] [stderr]    Compiling hashbrown v0.15.4
[INFO] [stderr]    Compiling syn v2.0.104
[INFO] [stderr]    Compiling openssl v0.10.73
[INFO] [stderr]    Compiling num-traits v0.2.19
[INFO] [stderr]    Compiling aho-corasick v1.1.3
[INFO] [stderr]    Compiling anstyle-parse v0.2.7
[INFO] [stderr]    Compiling colorchoice v1.0.4
[INFO] [stderr]    Compiling anstyle v1.0.11
[INFO] [stderr]    Compiling anstyle-query v1.1.3
[INFO] [stderr]    Compiling nom v7.1.3
[INFO] [stderr]    Compiling syn v1.0.109
[INFO] [stderr]    Compiling tokio-cron-scheduler v0.10.2
[INFO] [stderr]    Compiling clap_lex v0.7.5
[INFO] [stderr]    Compiling toml_write v0.1.2
[INFO] [stderr]    Compiling winnow v0.7.11
[INFO] [stderr]    Compiling semver v1.0.26
[INFO] [stderr]    Compiling anstream v0.6.19
[INFO] [stderr]    Compiling rustls-pemfile v1.0.4
[INFO] [stderr]    Compiling encoding_rs v0.8.35
[INFO] [stderr]    Compiling sync_wrapper v0.1.2
[INFO] [stderr]    Compiling quick-xml v0.36.2
[INFO] [stderr]    Compiling glob v0.3.2
[INFO] [stderr]    Compiling clap_builder v4.5.40
[INFO] [stderr]    Compiling indexmap v2.9.0
[INFO] [stderr]    Compiling regex-automata v0.4.9
[INFO] [stderr]    Compiling jobserver v0.1.33
[INFO] [stderr]    Compiling parking_lot_core v0.9.11
[INFO] [stderr]    Compiling socket2 v0.5.10
[INFO] [stderr]    Compiling signal-hook-registry v1.4.5
[INFO] [stderr]    Compiling mio v1.0.4
[INFO] [stderr]    Compiling parking_lot v0.12.4
[INFO] [stderr]    Compiling getrandom v0.3.3
[INFO] [stderr]    Compiling cc v1.2.27
[INFO] [stderr]    Compiling num-derive v0.3.3
[INFO] [stderr]    Compiling openssl-sys v0.9.109
[INFO] [stderr]    Compiling libz-sys v1.1.22
[INFO] [stderr]    Compiling libssh2-sys v0.3.1
[INFO] [stderr]    Compiling libgit2-sys v0.16.2+1.7.2
[INFO] [stderr]    Compiling native-tls v0.2.14
[INFO] [stderr]    Compiling regex v1.11.1
[INFO] [stderr]    Compiling synstructure v0.13.2
[INFO] [stderr]    Compiling zerofrom-derive v0.1.6
[INFO] [stderr]    Compiling yoke-derive v0.8.0
[INFO] [stderr]    Compiling zerovec-derive v0.11.1
[INFO] [stderr]    Compiling displaydoc v0.2.5
[INFO] [stderr]    Compiling serde_derive v1.0.219
[INFO] [stderr]    Compiling tokio-macros v2.5.0
[INFO] [stderr]    Compiling futures-macro v0.3.31
[INFO] [stderr]    Compiling tracing-attributes v0.1.30
[INFO] [stderr]    Compiling openssl-macros v0.1.1
[INFO] [stderr]    Compiling thiserror-impl v1.0.69
[INFO] [stderr]    Compiling clap_derive v4.5.40
[INFO] [stderr]    Compiling tokio v1.45.1
[INFO] [stderr]    Compiling futures-util v0.3.31
[INFO] [stderr]    Compiling zerofrom v0.1.6
[INFO] [stderr]    Compiling tracing v0.1.41
[INFO] [stderr]    Compiling yoke v0.8.0
[INFO] [stderr]    Compiling zerovec v0.11.2
[INFO] [stderr]    Compiling zerotrie v0.2.2
[INFO] [stderr]    Compiling tracing-subscriber v0.3.19
[INFO] [stderr]    Compiling thiserror v1.0.69
[INFO] [stderr]    Compiling clap v4.5.40
[INFO] [stderr]    Compiling tinystr v0.8.1
[INFO] [stderr]    Compiling potential_utf v0.1.2
[INFO] [stderr]    Compiling icu_collections v2.0.0
[INFO] [stderr]    Compiling icu_locale_core v2.0.0
[INFO] [stderr]    Compiling serde v1.0.219
[INFO] [stderr]    Compiling icu_provider v2.0.0
[INFO] [stderr]    Compiling futures-executor v0.3.31
[INFO] [stderr]    Compiling icu_normalizer v2.0.0
[INFO] [stderr]    Compiling icu_properties v2.0.1
[INFO] [stderr]    Compiling futures v0.3.31
[INFO] [stderr]    Compiling idna_adapter v1.2.1
[INFO] [stderr]    Compiling idna v1.0.3
[INFO] [stderr]    Compiling url v2.5.4
[INFO] [stderr]    Compiling git2 v0.18.3
[INFO] [stderr]    Compiling tokio-util v0.7.15
[INFO] [stderr]    Compiling tokio-native-tls v0.3.1
[INFO] [stderr]    Compiling toml_datetime v0.6.11
[INFO] [stderr]    Compiling chrono v0.4.41
[INFO] [stderr]    Compiling serde_spanned v0.6.9
[INFO] [stderr]    Compiling serde_json v1.0.140
[INFO] [stderr]    Compiling uuid v1.17.0
[INFO] [stderr]    Compiling serde_urlencoded v0.7.1
[INFO] [stderr]    Compiling toml_edit v0.22.27
[INFO] [stderr]    Compiling h2 v0.3.26
[INFO] [stderr]    Compiling cron v0.12.1
[INFO] [stderr]    Compiling toml v0.8.23
[INFO] [stderr]    Compiling hyper v0.14.32
[INFO] [stderr]    Compiling hyper-tls v0.5.0
[INFO] [stderr]    Compiling reqwest v0.11.27
[INFO] [stderr]    Compiling vulfy v0.1.0 (/opt/rustwide/workdir)
[INFO] [stdout] warning: variants `PackageParsing` and `VersionParsing` are never constructed
[INFO] [stdout]   --> src/error.rs:29:5
[INFO] [stdout]    |
[INFO] [stdout]  6 | pub enum VulfyError {
[INFO] [stdout]    |          ---------- variants in this enum
[INFO] [stdout] ...
[INFO] [stdout] 29 |     PackageParsing { message: String },
[INFO] [stdout]    |     ^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 32 |     VersionParsing { message: String },
[INFO] [stdout]    |     ^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used
[INFO] [stdout]    --> src/scanner/mod.rs:284:14
[INFO] [stdout]     |
[INFO] [stdout]  97 | impl Scanner {
[INFO] [stdout]     | ------------ methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 284 |     async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult<Vec<Package>> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 315 |     async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult<Vec<Package>> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `format_json_report` is never used
[INFO] [stdout]    --> src/reporter.rs:252:14
[INFO] [stdout]     |
[INFO] [stdout]  12 | impl Reporter {
[INFO] [stdout]     | ------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 252 |     async fn format_json_report(&self, scan_result: &ScanResult) -> VulfyResult<String> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `matches` is never used
[INFO] [stdout]    --> src/automation/mod.rs:226:12
[INFO] [stdout]     |
[INFO] [stdout] 224 | impl ScanPolicy {
[INFO] [stdout]     | --------------- method in this implementation
[INFO] [stdout] 225 |     /// Check if a vulnerability matches this policy
[INFO] [stdout] 226 |     pub fn matches(&self, vulnerability: &Vulnerability) -> bool {
[INFO] [stdout]     |            ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `is_running` is never used
[INFO] [stdout]    --> src/automation/scheduler.rs:146:18
[INFO] [stdout]     |
[INFO] [stdout]  24 | impl AutomationScheduler {
[INFO] [stdout]     | ------------------------ method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 146 |     pub async fn is_running(&self) -> bool {
[INFO] [stdout]     |                  ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read
[INFO] [stdout]   --> src/automation/policy.rs:13:9
[INFO] [stdout]    |
[INFO] [stdout] 12 | pub struct PolicyMatch {
[INFO] [stdout]    |            ----------- fields in this struct
[INFO] [stdout] 13 |     pub policy_name: String,
[INFO] [stdout]    |         ^^^^^^^^^^^
[INFO] [stdout] 14 |     pub vulnerability_id: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^
[INFO] [stdout] 15 |     pub package_name: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^
[INFO] [stdout] 16 |     pub actions: PolicyActions,
[INFO] [stdout]    |         ^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read
[INFO] [stdout]   --> src/automation/policy.rs:22:9
[INFO] [stdout]    |
[INFO] [stdout] 20 | pub struct FilteredScanResult {
[INFO] [stdout]    |            ------------------ fields in this struct
[INFO] [stdout] 21 |     pub scan_result: ScanResult,
[INFO] [stdout] 22 |     pub policy_matches: Vec<PolicyMatch>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 23 |     pub ignored_vulnerabilities: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 24 |     pub prioritized_vulnerabilities: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `get_policy_stats` is never used
[INFO] [stdout]    --> src/automation/policy.rs:436:12
[INFO] [stdout]     |
[INFO] [stdout]  27 | impl PolicyEngine {
[INFO] [stdout]     | ----------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 436 |     pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: struct `PolicyStats` is never constructed
[INFO] [stdout]    --> src/automation/policy.rs:460:12
[INFO] [stdout]     |
[INFO] [stdout] 460 | pub struct PolicyStats {
[INFO] [stdout]     |            ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 1m 37s
[INFO] running `Command { std: "docker" "inspect" "3a0d5004e88ccedf27c835f44139b133cc1333841aebfa89ddd8a7acd27e083c", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "3a0d5004e88ccedf27c835f44139b133cc1333841aebfa89ddd8a7acd27e083c", kill_on_drop: false }`
[INFO] [stdout] 3a0d5004e88ccedf27c835f44139b133cc1333841aebfa89ddd8a7acd27e083c
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+c7f6aa2869acdbf014d094c6e427e554e160b6db" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 1c4452803d7e38d365daa0a1b5563a66c67e493afdcbb950fad8d3883e2cfca3
[INFO] running `Command { std: "docker" "start" "-a" "1c4452803d7e38d365daa0a1b5563a66c67e493afdcbb950fad8d3883e2cfca3", kill_on_drop: false }`
[INFO] [stderr]    Compiling bitflags v2.9.1
[INFO] [stderr]    Compiling tokio v1.45.1
[INFO] [stderr]    Compiling rustix v1.0.7
[INFO] [stderr]    Compiling async-stream-impl v0.3.6
[INFO] [stderr]    Compiling linux-raw-sys v0.9.4
[INFO] [stderr]    Compiling fastrand v2.3.0
[INFO] [stderr]    Compiling openssl v0.10.73
[INFO] [stderr]    Compiling git2 v0.18.3
[INFO] [stderr]    Compiling async-stream v0.3.6
[INFO] [stderr]    Compiling tempfile v3.20.0
[INFO] [stderr]    Compiling native-tls v0.2.14
[INFO] [stderr]    Compiling tokio-util v0.7.15
[INFO] [stderr]    Compiling tokio-native-tls v0.3.1
[INFO] [stderr]    Compiling tokio-stream v0.1.17
[INFO] [stderr]    Compiling tokio-cron-scheduler v0.10.2
[INFO] [stderr]    Compiling h2 v0.3.26
[INFO] [stderr]    Compiling tokio-test v0.4.4
[INFO] [stderr]    Compiling hyper v0.14.32
[INFO] [stderr]    Compiling hyper-tls v0.5.0
[INFO] [stderr]    Compiling reqwest v0.11.27
[INFO] [stderr]    Compiling vulfy v0.1.0 (/opt/rustwide/workdir)
[INFO] [stdout] warning: variants `PackageParsing` and `VersionParsing` are never constructed
[INFO] [stdout]   --> src/error.rs:29:5
[INFO] [stdout]    |
[INFO] [stdout]  6 | pub enum VulfyError {
[INFO] [stdout]    |          ---------- variants in this enum
[INFO] [stdout] ...
[INFO] [stdout] 29 |     PackageParsing { message: String },
[INFO] [stdout]    |     ^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 32 |     VersionParsing { message: String },
[INFO] [stdout]    |     ^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used
[INFO] [stdout]    --> src/scanner/mod.rs:284:14
[INFO] [stdout]     |
[INFO] [stdout]  97 | impl Scanner {
[INFO] [stdout]     | ------------ methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 284 |     async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult<Vec<Package>> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 315 |     async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult<Vec<Package>> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `format_json_report` is never used
[INFO] [stdout]    --> src/reporter.rs:252:14
[INFO] [stdout]     |
[INFO] [stdout]  12 | impl Reporter {
[INFO] [stdout]     | ------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 252 |     async fn format_json_report(&self, scan_result: &ScanResult) -> VulfyResult<String> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `matches` is never used
[INFO] [stdout]    --> src/automation/mod.rs:226:12
[INFO] [stdout]     |
[INFO] [stdout] 224 | impl ScanPolicy {
[INFO] [stdout]     | --------------- method in this implementation
[INFO] [stdout] 225 |     /// Check if a vulnerability matches this policy
[INFO] [stdout] 226 |     pub fn matches(&self, vulnerability: &Vulnerability) -> bool {
[INFO] [stdout]     |            ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `is_running` is never used
[INFO] [stdout]    --> src/automation/scheduler.rs:146:18
[INFO] [stdout]     |
[INFO] [stdout]  24 | impl AutomationScheduler {
[INFO] [stdout]     | ------------------------ method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 146 |     pub async fn is_running(&self) -> bool {
[INFO] [stdout]     |                  ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read
[INFO] [stdout]   --> src/automation/policy.rs:13:9
[INFO] [stdout]    |
[INFO] [stdout] 12 | pub struct PolicyMatch {
[INFO] [stdout]    |            ----------- fields in this struct
[INFO] [stdout] 13 |     pub policy_name: String,
[INFO] [stdout]    |         ^^^^^^^^^^^
[INFO] [stdout] 14 |     pub vulnerability_id: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^
[INFO] [stdout] 15 |     pub package_name: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^
[INFO] [stdout] 16 |     pub actions: PolicyActions,
[INFO] [stdout]    |         ^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read
[INFO] [stdout]   --> src/automation/policy.rs:22:9
[INFO] [stdout]    |
[INFO] [stdout] 20 | pub struct FilteredScanResult {
[INFO] [stdout]    |            ------------------ fields in this struct
[INFO] [stdout] 21 |     pub scan_result: ScanResult,
[INFO] [stdout] 22 |     pub policy_matches: Vec<PolicyMatch>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 23 |     pub ignored_vulnerabilities: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 24 |     pub prioritized_vulnerabilities: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `get_policy_stats` is never used
[INFO] [stdout]    --> src/automation/policy.rs:436:12
[INFO] [stdout]     |
[INFO] [stdout]  27 | impl PolicyEngine {
[INFO] [stdout]     | ----------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 436 |     pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: struct `PolicyStats` is never constructed
[INFO] [stdout]    --> src/automation/policy.rs:460:12
[INFO] [stdout]     |
[INFO] [stdout] 460 | pub struct PolicyStats {
[INFO] [stdout]     |            ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 31.66s
[INFO] running `Command { std: "docker" "inspect" "1c4452803d7e38d365daa0a1b5563a66c67e493afdcbb950fad8d3883e2cfca3", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "1c4452803d7e38d365daa0a1b5563a66c67e493afdcbb950fad8d3883e2cfca3", kill_on_drop: false }`
[INFO] [stdout] 1c4452803d7e38d365daa0a1b5563a66c67e493afdcbb950fad8d3883e2cfca3
