[INFO] cloning repository https://github.com/MindPatch/Vulfy
[INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/MindPatch/Vulfy" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FMindPatch%2FVulfy", kill_on_drop: false }`
[INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FMindPatch%2FVulfy'...
[INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }`
[INFO] [stdout] 2c5a4bf587f47ea57b0491ca15f5a0b25efb35a5
[INFO] checking MindPatch/Vulfy against master#779e19d8baa3e3625bd4fc5c85cbb2ad47b43155 for pr-147589-1
[INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FMindPatch%2FVulfy" "/workspace/builds/worker-7-tc1/source", kill_on_drop: false }`
[INFO] [stderr] Cloning into '/workspace/builds/worker-7-tc1/source'...
[INFO] [stderr] done.
[INFO] started tweaking git repo https://github.com/MindPatch/Vulfy
[INFO] finished tweaking git repo https://github.com/MindPatch/Vulfy
[INFO] tweaked toml for git repo https://github.com/MindPatch/Vulfy written to /workspace/builds/worker-7-tc1/source/Cargo.toml
[INFO] validating manifest of git repo https://github.com/MindPatch/Vulfy on toolchain 779e19d8baa3e3625bd4fc5c85cbb2ad47b43155
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+779e19d8baa3e3625bd4fc5c85cbb2ad47b43155" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate git repo https://github.com/MindPatch/Vulfy already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+779e19d8baa3e3625bd4fc5c85cbb2ad47b43155" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded cron v0.12.1
[INFO] [stderr]   Downloaded tokio-cron-scheduler v0.10.2
[INFO] [stderr]   Downloaded bumpalo v3.18.1
[INFO] [stderr]   Downloaded git2 v0.18.3
[INFO] [stderr]   Downloaded libssh2-sys v0.3.1
[INFO] [stderr]   Downloaded libz-sys v1.1.22
[INFO] [stderr]   Downloaded libgit2-sys v0.16.2+1.7.2
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+779e19d8baa3e3625bd4fc5c85cbb2ad47b43155" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 462cac3a6bf2483a92b37226379f89c80ca4bb8442d77ef5d11f6503668d1b24
[INFO] running `Command { std: "docker" "start" "-a" "462cac3a6bf2483a92b37226379f89c80ca4bb8442d77ef5d11f6503668d1b24", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "462cac3a6bf2483a92b37226379f89c80ca4bb8442d77ef5d11f6503668d1b24", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "462cac3a6bf2483a92b37226379f89c80ca4bb8442d77ef5d11f6503668d1b24", kill_on_drop: false }`
[INFO] [stdout] 462cac3a6bf2483a92b37226379f89c80ca4bb8442d77ef5d11f6503668d1b24
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+779e19d8baa3e3625bd4fc5c85cbb2ad47b43155" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 7d072b705474f0a996059d1dd69c9d040f8501f963f1f38b8b442a3168bf9f71
[INFO] running `Command { std: "docker" "start" "-a" "7d072b705474f0a996059d1dd69c9d040f8501f963f1f38b8b442a3168bf9f71", kill_on_drop: false }`
[INFO] [stderr]    Compiling syn v2.0.104
[INFO] [stderr]    Compiling libc v0.2.174
[INFO] [stderr]     Checking cfg-if v1.0.1
[INFO] [stderr]     Checking smallvec v1.15.1
[INFO] [stderr]     Checking bitflags v2.9.1
[INFO] [stderr]     Checking futures-io v0.3.31
[INFO] [stderr]     Checking log v0.4.27
[INFO] [stderr]     Checking slab v0.4.10
[INFO] [stderr]     Checking hashbrown v0.15.4
[INFO] [stderr]    Compiling num-traits v0.2.19
[INFO] [stderr]    Compiling syn v1.0.109
[INFO] [stderr]     Checking anstyle-parse v0.2.7
[INFO] [stderr]     Checking aho-corasick v1.1.3
[INFO] [stderr]     Checking anstyle v1.0.11
[INFO] [stderr]     Checking colorchoice v1.0.4
[INFO] [stderr]     Checking anstyle-query v1.1.3
[INFO] [stderr]     Checking regex-automata v0.1.10
[INFO] [stderr]     Checking clap_lex v0.7.5
[INFO] [stderr]     Checking toml_write v0.1.2
[INFO] [stderr]    Compiling tokio-cron-scheduler v0.10.2
[INFO] [stderr]    Compiling rustix v1.0.7
[INFO] [stderr]     Checking overload v0.1.1
[INFO] [stderr]     Checking winnow v0.7.11
[INFO] [stderr]     Checking anstream v0.6.19
[INFO] [stderr]    Compiling anyhow v1.0.98
[INFO] [stderr]     Checking tracing-log v0.2.0
[INFO] [stderr]     Checking nu-ansi-term v0.46.0
[INFO] [stderr]     Checking encoding_rs v0.8.35
[INFO] [stderr]     Checking thread_local v1.1.9
[INFO] [stderr]     Checking linux-raw-sys v0.9.4
[INFO] [stderr]     Checking indexmap v2.9.0
[INFO] [stderr]     Checking same-file v1.0.6
[INFO] [stderr]     Checking clap_builder v4.5.40
[INFO] [stderr]     Checking walkdir v2.5.0
[INFO] [stderr]     Checking quick-xml v0.36.2
[INFO] [stderr]     Checking fastrand v2.3.0
[INFO] [stderr]     Checking glob v0.3.2
[INFO] [stderr]     Checking matchers v0.1.0
[INFO] [stderr]     Checking parking_lot_core v0.9.11
[INFO] [stderr]     Checking socket2 v0.5.10
[INFO] [stderr]     Checking mio v1.0.4
[INFO] [stderr]     Checking signal-hook-registry v1.4.5
[INFO] [stderr]     Checking getrandom v0.3.3
[INFO] [stderr]     Checking regex-automata v0.4.9
[INFO] [stderr]     Checking parking_lot v0.12.4
[INFO] [stderr]    Compiling jobserver v0.1.33
[INFO] [stderr]    Compiling num-derive v0.3.3
[INFO] [stderr]    Compiling cc v1.2.27
[INFO] [stderr]     Checking tempfile v3.20.0
[INFO] [stderr]    Compiling openssl-sys v0.9.109
[INFO] [stderr]    Compiling libz-sys v1.1.22
[INFO] [stderr]    Compiling libssh2-sys v0.3.1
[INFO] [stderr]    Compiling libgit2-sys v0.16.2+1.7.2
[INFO] [stderr]     Checking regex v1.11.1
[INFO] [stderr]    Compiling openssl v0.10.73
[INFO] [stderr]    Compiling native-tls v0.2.14
[INFO] [stderr]    Compiling synstructure v0.13.2
[INFO] [stderr]    Compiling zerofrom-derive v0.1.6
[INFO] [stderr]    Compiling yoke-derive v0.8.0
[INFO] [stderr]    Compiling zerovec-derive v0.11.1
[INFO] [stderr]    Compiling displaydoc v0.2.5
[INFO] [stderr]    Compiling serde_derive v1.0.219
[INFO] [stderr]    Compiling tokio-macros v2.5.0
[INFO] [stderr]    Compiling futures-macro v0.3.31
[INFO] [stderr]    Compiling tracing-attributes v0.1.30
[INFO] [stderr]    Compiling openssl-macros v0.1.1
[INFO] [stderr]    Compiling async-stream-impl v0.3.6
[INFO] [stderr]    Compiling thiserror-impl v1.0.69
[INFO] [stderr]    Compiling clap_derive v4.5.40
[INFO] [stderr]     Checking async-stream v0.3.6
[INFO] [stderr]     Checking tokio v1.45.1
[INFO] [stderr]     Checking futures-util v0.3.31
[INFO] [stderr]     Checking tracing v0.1.41
[INFO] [stderr]     Checking thiserror v1.0.69
[INFO] [stderr]     Checking tracing-subscriber v0.3.19
[INFO] [stderr]     Checking zerofrom v0.1.6
[INFO] [stderr]     Checking yoke v0.8.0
[INFO] [stderr]     Checking zerovec v0.11.2
[INFO] [stderr]     Checking zerotrie v0.2.2
[INFO] [stderr]     Checking clap v4.5.40
[INFO] [stderr]     Checking tinystr v0.8.1
[INFO] [stderr]     Checking potential_utf v0.1.2
[INFO] [stderr]     Checking serde v1.0.219
[INFO] [stderr]     Checking icu_collections v2.0.0
[INFO] [stderr]     Checking icu_locale_core v2.0.0
[INFO] [stderr]     Checking icu_provider v2.0.0
[INFO] [stderr]     Checking icu_properties v2.0.1
[INFO] [stderr]     Checking icu_normalizer v2.0.0
[INFO] [stderr]     Checking futures-executor v0.3.31
[INFO] [stderr]     Checking idna_adapter v1.2.1
[INFO] [stderr]     Checking futures v0.3.31
[INFO] [stderr]     Checking idna v1.0.3
[INFO] [stderr]     Checking url v2.5.4
[INFO] [stderr]     Checking git2 v0.18.3
[INFO] [stderr]     Checking tokio-util v0.7.15
[INFO] [stderr]     Checking tokio-native-tls v0.3.1
[INFO] [stderr]     Checking tokio-stream v0.1.17
[INFO] [stderr]     Checking tokio-test v0.4.4
[INFO] [stderr]     Checking h2 v0.3.26
[INFO] [stderr]     Checking chrono v0.4.41
[INFO] [stderr]     Checking serde_spanned v0.6.9
[INFO] [stderr]     Checking toml_datetime v0.6.11
[INFO] [stderr]     Checking serde_urlencoded v0.7.1
[INFO] [stderr]     Checking serde_json v1.0.140
[INFO] [stderr]     Checking uuid v1.17.0
[INFO] [stderr]     Checking toml_edit v0.22.27
[INFO] [stderr]     Checking cron v0.12.1
[INFO] [stderr]     Checking toml v0.8.23
[INFO] [stderr]     Checking hyper v0.14.32
[INFO] [stderr]     Checking hyper-tls v0.5.0
[INFO] [stderr]     Checking reqwest v0.11.27
[INFO] [stderr]     Checking vulfy v0.1.0 (/opt/rustwide/workdir)
[INFO] [stdout] warning: variants `PackageParsing` and `VersionParsing` are never constructed
[INFO] [stdout]   --> src/error.rs:29:5
[INFO] [stdout]    |
[INFO] [stdout]  6 | pub enum VulfyError {
[INFO] [stdout]    |          ---------- variants in this enum
[INFO] [stdout] ...
[INFO] [stdout] 29 |     PackageParsing { message: String },
[INFO] [stdout]    |     ^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 32 |     VersionParsing { message: String },
[INFO] [stdout]    |     ^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used
[INFO] [stdout]    --> src/scanner/mod.rs:284:14
[INFO] [stdout]     |
[INFO] [stdout]  97 | impl Scanner {
[INFO] [stdout]     | ------------ methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 284 |     async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult<Vec<Package>> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 315 |     async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult<Vec<Package>> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `format_json_report` is never used
[INFO] [stdout]    --> src/reporter.rs:252:14
[INFO] [stdout]     |
[INFO] [stdout]  12 | impl Reporter {
[INFO] [stdout]     | ------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 252 |     async fn format_json_report(&self, scan_result: &ScanResult) -> VulfyResult<String> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `matches` is never used
[INFO] [stdout]    --> src/automation/mod.rs:226:12
[INFO] [stdout]     |
[INFO] [stdout] 224 | impl ScanPolicy {
[INFO] [stdout]     | --------------- method in this implementation
[INFO] [stdout] 225 |     /// Check if a vulnerability matches this policy
[INFO] [stdout] 226 |     pub fn matches(&self, vulnerability: &Vulnerability) -> bool {
[INFO] [stdout]     |            ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `is_running` is never used
[INFO] [stdout]    --> src/automation/scheduler.rs:146:18
[INFO] [stdout]     |
[INFO] [stdout]  24 | impl AutomationScheduler {
[INFO] [stdout]     | ------------------------ method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 146 |     pub async fn is_running(&self) -> bool {
[INFO] [stdout]     |                  ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read
[INFO] [stdout]   --> src/automation/policy.rs:13:9
[INFO] [stdout]    |
[INFO] [stdout] 12 | pub struct PolicyMatch {
[INFO] [stdout]    |            ----------- fields in this struct
[INFO] [stdout] 13 |     pub policy_name: String,
[INFO] [stdout]    |         ^^^^^^^^^^^
[INFO] [stdout] 14 |     pub vulnerability_id: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^
[INFO] [stdout] 15 |     pub package_name: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^
[INFO] [stdout] 16 |     pub actions: PolicyActions,
[INFO] [stdout]    |         ^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read
[INFO] [stdout]   --> src/automation/policy.rs:22:9
[INFO] [stdout]    |
[INFO] [stdout] 20 | pub struct FilteredScanResult {
[INFO] [stdout]    |            ------------------ fields in this struct
[INFO] [stdout] 21 |     pub scan_result: ScanResult,
[INFO] [stdout] 22 |     pub policy_matches: Vec<PolicyMatch>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 23 |     pub ignored_vulnerabilities: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 24 |     pub prioritized_vulnerabilities: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `get_policy_stats` is never used
[INFO] [stdout]    --> src/automation/policy.rs:436:12
[INFO] [stdout]     |
[INFO] [stdout]  27 | impl PolicyEngine {
[INFO] [stdout]     | ----------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 436 |     pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: struct `PolicyStats` is never constructed
[INFO] [stdout]    --> src/automation/policy.rs:460:12
[INFO] [stdout]     |
[INFO] [stdout] 460 | pub struct PolicyStats {
[INFO] [stdout]     |            ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variants `PackageParsing` and `VersionParsing` are never constructed
[INFO] [stdout]   --> src/error.rs:29:5
[INFO] [stdout]    |
[INFO] [stdout]  6 | pub enum VulfyError {
[INFO] [stdout]    |          ---------- variants in this enum
[INFO] [stdout] ...
[INFO] [stdout] 29 |     PackageParsing { message: String },
[INFO] [stdout]    |     ^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 32 |     VersionParsing { message: String },
[INFO] [stdout]    |     ^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used
[INFO] [stdout]    --> src/scanner/mod.rs:284:14
[INFO] [stdout]     |
[INFO] [stdout]  97 | impl Scanner {
[INFO] [stdout]     | ------------ methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 284 |     async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult<Vec<Package>> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 315 |     async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult<Vec<Package>> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `format_json_report` is never used
[INFO] [stdout]    --> src/reporter.rs:252:14
[INFO] [stdout]     |
[INFO] [stdout]  12 | impl Reporter {
[INFO] [stdout]     | ------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 252 |     async fn format_json_report(&self, scan_result: &ScanResult) -> VulfyResult<String> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `matches` is never used
[INFO] [stdout]    --> src/automation/mod.rs:226:12
[INFO] [stdout]     |
[INFO] [stdout] 224 | impl ScanPolicy {
[INFO] [stdout]     | --------------- method in this implementation
[INFO] [stdout] 225 |     /// Check if a vulnerability matches this policy
[INFO] [stdout] 226 |     pub fn matches(&self, vulnerability: &Vulnerability) -> bool {
[INFO] [stdout]     |            ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `is_running` is never used
[INFO] [stdout]    --> src/automation/scheduler.rs:146:18
[INFO] [stdout]     |
[INFO] [stdout]  24 | impl AutomationScheduler {
[INFO] [stdout]     | ------------------------ method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 146 |     pub async fn is_running(&self) -> bool {
[INFO] [stdout]     |                  ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read
[INFO] [stdout]   --> src/automation/policy.rs:13:9
[INFO] [stdout]    |
[INFO] [stdout] 12 | pub struct PolicyMatch {
[INFO] [stdout]    |            ----------- fields in this struct
[INFO] [stdout] 13 |     pub policy_name: String,
[INFO] [stdout]    |         ^^^^^^^^^^^
[INFO] [stdout] 14 |     pub vulnerability_id: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^
[INFO] [stdout] 15 |     pub package_name: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^
[INFO] [stdout] 16 |     pub actions: PolicyActions,
[INFO] [stdout]    |         ^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read
[INFO] [stdout]   --> src/automation/policy.rs:22:9
[INFO] [stdout]    |
[INFO] [stdout] 20 | pub struct FilteredScanResult {
[INFO] [stdout]    |            ------------------ fields in this struct
[INFO] [stdout] 21 |     pub scan_result: ScanResult,
[INFO] [stdout] 22 |     pub policy_matches: Vec<PolicyMatch>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 23 |     pub ignored_vulnerabilities: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 24 |     pub prioritized_vulnerabilities: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `get_policy_stats` is never used
[INFO] [stdout]    --> src/automation/policy.rs:436:12
[INFO] [stdout]     |
[INFO] [stdout]  27 | impl PolicyEngine {
[INFO] [stdout]     | ----------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 436 |     pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: struct `PolicyStats` is never constructed
[INFO] [stdout]    --> src/automation/policy.rs:460:12
[INFO] [stdout]     |
[INFO] [stdout] 460 | pub struct PolicyStats {
[INFO] [stdout]     |            ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 58.30s
[INFO] running `Command { std: "docker" "inspect" "7d072b705474f0a996059d1dd69c9d040f8501f963f1f38b8b442a3168bf9f71", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "7d072b705474f0a996059d1dd69c9d040f8501f963f1f38b8b442a3168bf9f71", kill_on_drop: false }`
[INFO] [stdout] 7d072b705474f0a996059d1dd69c9d040f8501f963f1f38b8b442a3168bf9f71
