[INFO] fetching crate syncable-cli 0.18.5...
[INFO] checking syncable-cli-0.18.5 against try#943e2200e35c3825486c4671b6cab0107a07f8c1 for pr-148952
[INFO] extracting crate syncable-cli 0.18.5 into /workspace/builds/worker-2-tc2/source
[INFO] removed /workspace/builds/worker-2-tc2/source/.cargo/config.toml
[INFO] started tweaking crates.io crate syncable-cli 0.18.5
[INFO] removed 0 missing examples
[INFO] removed 0 missing tests
[INFO] finished tweaking crates.io crate syncable-cli 0.18.5
[INFO] tweaked toml for crates.io crate syncable-cli 0.18.5 written to /workspace/builds/worker-2-tc2/source/Cargo.toml
[INFO] validating manifest of crates.io crate syncable-cli 0.18.5 on toolchain 943e2200e35c3825486c4671b6cab0107a07f8c1
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+943e2200e35c3825486c4671b6cab0107a07f8c1" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate crates.io crate syncable-cli 0.18.5 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+943e2200e35c3825486c4671b6cab0107a07f8c1" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+943e2200e35c3825486c4671b6cab0107a07f8c1" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 7ddd2dd2057b555ec7fb9c671e0031a0520a8feda23124a99bf2bb37c3f2c79e
[INFO] running `Command { std: "docker" "start" "-a" "7ddd2dd2057b555ec7fb9c671e0031a0520a8feda23124a99bf2bb37c3f2c79e", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "7ddd2dd2057b555ec7fb9c671e0031a0520a8feda23124a99bf2bb37c3f2c79e", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "7ddd2dd2057b555ec7fb9c671e0031a0520a8feda23124a99bf2bb37c3f2c79e", kill_on_drop: false }`
[INFO] [stdout] 7ddd2dd2057b555ec7fb9c671e0031a0520a8feda23124a99bf2bb37c3f2c79e
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+943e2200e35c3825486c4671b6cab0107a07f8c1" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] d9d4d21afe63456d2897c978538080c65a98b9f1e222996e2dfa17f9f83adb17
[INFO] running `Command { std: "docker" "start" "-a" "d9d4d21afe63456d2897c978538080c65a98b9f1e222996e2dfa17f9f83adb17", kill_on_drop: false }`
[INFO] [stderr]    Compiling serde_core v1.0.224
[INFO] [stderr]     Checking smallvec v1.15.0
[INFO] [stderr]    Compiling serde v1.0.224
[INFO] [stderr]     Checking gix-trace v0.1.12
[INFO] [stderr]     Checking regex-automata v0.4.9
[INFO] [stderr]     Checking tinyvec v1.9.0
[INFO] [stderr]     Checking home v0.5.11
[INFO] [stderr]    Compiling serde_derive v1.0.224
[INFO] [stderr]     Checking flate2 v1.1.1
[INFO] [stderr]    Compiling heapless v0.8.0
[INFO] [stderr]     Checking getrandom v0.3.3
[INFO] [stderr]     Checking hash32 v0.3.1
[INFO] [stderr]     Checking winnow v0.7.10
[INFO] [stderr]     Checking crypto-common v0.1.6
[INFO] [stderr]    Compiling cc v1.2.25
[INFO] [stderr]     Checking jiff v0.2.14
[INFO] [stderr]    Compiling rustix v1.0.7
[INFO] [stderr]     Checking digest v0.10.7
[INFO] [stderr]     Checking yoke v0.8.0
[INFO] [stderr]     Checking memmap2 v0.9.8
[INFO] [stderr]     Checking mio v1.0.4
[INFO] [stderr]     Checking ahash v0.8.12
[INFO] [stderr]     Checking socket2 v0.6.0
[INFO] [stderr]     Checking sha1 v0.10.6
[INFO] [stderr]     Checking parking_lot_core v0.9.11
[INFO] [stderr]     Checking hashbrown v0.14.5
[INFO] [stderr]     Checking zerovec v0.11.2
[INFO] [stderr]     Checking unicode-normalization v0.1.24
[INFO] [stderr]     Checking parking_lot v0.12.4
[INFO] [stderr]     Checking zerotrie v0.2.2
[INFO] [stderr]     Checking sha1-checked v0.10.0
[INFO] [stderr]     Checking gix-chunk v0.4.11
[INFO] [stderr]     Checking hashbrown v0.15.3
[INFO] [stderr]     Checking prodash v29.0.2
[INFO] [stderr]     Checking tokio v1.47.0
[INFO] [stderr]     Checking getrandom v0.2.16
[INFO] [stderr]     Checking futures-util v0.3.31
[INFO] [stderr]     Checking tracing-core v0.1.33
[INFO] [stderr]     Checking gix-utils v0.3.0
[INFO] [stderr]     Checking unicode-bom v2.0.3
[INFO] [stderr]    Compiling openssl-macros v0.1.1
[INFO] [stderr]    Compiling rustls v0.23.27
[INFO] [stderr]     Checking kstring v2.0.2
[INFO] [stderr]     Checking gix-sec v0.11.0
[INFO] [stderr]     Checking socket2 v0.5.10
[INFO] [stderr]    Compiling num-traits v0.2.19
[INFO] [stderr]    Compiling regex-syntax v0.8.5
[INFO] [stderr]     Checking rustls-native-certs v0.8.1
[INFO] [stderr]     Checking indexmap v2.9.0
[INFO] [stderr]     Checking tracing v0.1.41
[INFO] [stderr]     Checking gix-bitmap v0.2.14
[INFO] [stderr]     Checking filetime v0.2.25
[INFO] [stderr]    Compiling phf_codegen v0.11.3
[INFO] [stderr]     Checking uluru v3.1.0
[INFO] [stderr]     Checking tinystr v0.8.1
[INFO] [stderr]     Checking potential_utf v0.1.2
[INFO] [stderr]    Compiling phf v0.11.3
[INFO] [stderr]    Compiling thiserror v2.0.12
[INFO] [stderr]     Checking icu_collections v2.0.0
[INFO] [stderr]    Compiling ucd-trie v0.1.7
[INFO] [stderr]     Checking clru v0.6.2
[INFO] [stderr]    Compiling semver v1.0.26
[INFO] [stderr]     Checking icu_locale_core v2.0.0
[INFO] [stderr]    Compiling pest v2.8.0
[INFO] [stderr]    Compiling maybe-async v0.2.10
[INFO] [stderr]     Checking io-close v0.3.7
[INFO] [stderr]     Checking unic-common v0.9.0
[INFO] [stderr]    Compiling camino v1.1.10
[INFO] [stderr]    Compiling openssl-sys v0.9.109
[INFO] [stderr]    Compiling ring v0.17.14
[INFO] [stderr]     Checking unic-char-range v0.9.0
[INFO] [stderr]     Checking phf_shared v0.11.3
[INFO] [stderr]     Checking unic-char-property v0.9.0
[INFO] [stderr]     Checking bstr v1.12.0
[INFO] [stderr]     Checking regex v1.11.1
[INFO] [stderr]     Checking unic-ucd-version v0.9.0
[INFO] [stderr]     Checking rand_core v0.6.4
[INFO] [stderr]     Checking dirs-sys-next v0.1.2
[INFO] [stderr]    Compiling fs-err v3.1.1
[INFO] [stderr]     Checking iana-time-zone v0.1.63
[INFO] [stderr]     Checking rayon v1.10.0
[INFO] [stderr]     Checking rand_chacha v0.3.1
[INFO] [stderr]     Checking dirs-next v2.0.0
[INFO] [stderr]     Checking icu_provider v2.0.0
[INFO] [stderr]     Checking unic-ucd-segment v0.9.0
[INFO] [stderr]    Compiling openssl v0.10.73
[INFO] [stderr]    Compiling native-tls v0.2.14
[INFO] [stderr]     Checking gix-validate v0.10.0
[INFO] [stderr]     Checking gix-quote v0.6.0
[INFO] [stderr]     Checking tempfile v3.20.0
[INFO] [stderr]     Checking gix-path v0.10.18
[INFO] [stderr]     Checking globset v0.4.16
[INFO] [stderr]     Checking icu_properties v2.0.1
[INFO] [stderr]     Checking icu_normalizer v2.0.0
[INFO] [stderr]    Compiling blake3 v1.8.2
[INFO] [stderr]     Checking toml-span v0.5.2
[INFO] [stderr]     Checking gix-features v0.42.1
[INFO] [stderr]     Checking gix-config-value v0.15.0
[INFO] [stderr]     Checking gix-command v0.6.1
[INFO] [stderr]     Checking ignore v0.4.23
[INFO] [stderr]     Checking gix-fs v0.15.0
[INFO] [stderr]     Checking gix-glob v0.20.1
[INFO] [stderr]     Checking gix-prompt v0.11.0
[INFO] [stderr]    Compiling pest_meta v2.8.0
[INFO] [stderr]     Checking rand_core v0.9.3
[INFO] [stderr]     Checking gix-tempfile v17.1.0
[INFO] [stderr]     Checking csv-core v0.1.12
[INFO] [stderr]     Checking rustc-stable-hash v0.1.2
[INFO] [stderr]     Checking gix-lock v17.1.0
[INFO] [stderr]     Checking deunicode v1.6.2
[INFO] [stderr]     Checking twox-hash v2.1.1
[INFO] [stderr]     Checking clap_builder v4.5.44
[INFO] [stderr]     Checking dirs-sys v0.5.0
[INFO] [stderr]    Compiling clap_derive v4.5.41
[INFO] [stderr]     Checking idna_adapter v1.2.1
[INFO] [stderr]     Checking gix-attributes v0.26.1
[INFO] [stderr]     Checking gix-ignore v0.15.0
[INFO] [stderr]     Checking globwalk v0.9.1
[INFO] [stderr]     Checking slug v0.1.6
[INFO] [stderr]     Checking idna v1.0.3
[INFO] [stderr]     Checking unic-segment v0.9.0
[INFO] [stderr]     Checking env_filter v0.1.3
[INFO] [stderr]     Checking faster-hex v0.10.0
[INFO] [stderr]     Checking serde_json v1.0.142
[INFO] [stderr]     Checking serde_urlencoded v0.7.1
[INFO] [stderr]     Checking gix-date v0.10.2
[INFO] [stderr]     Checking url v2.5.4
[INFO] [stderr]     Checking gix-hash v0.18.0
[INFO] [stderr]     Checking gix-actor v0.35.1
[INFO] [stderr]     Checking gix-packetline-blocking v0.19.0
[INFO] [stderr]     Checking gix-packetline v0.19.0
[INFO] [stderr]     Checking gix-pathspec v0.11.0
[INFO] [stderr]     Checking gix-hashtable v0.8.1
[INFO] [stderr]     Checking gix-commitgraph v0.28.0
[INFO] [stderr]     Checking gix-object v0.49.1
[INFO] [stderr]     Checking gix-shallow v0.4.0
[INFO] [stderr]     Checking toml_datetime v0.6.11
[INFO] [stderr]     Checking serde_spanned v0.6.9
[INFO] [stderr]    Compiling pest_generator v2.8.0
[INFO] [stderr]     Checking toml_edit v0.22.27
[INFO] [stderr]     Checking smol_str v0.3.2
[INFO] [stderr]     Checking gix-url v0.31.0
[INFO] [stderr]     Checking deranged v0.4.0
[INFO] [stderr]     Checking chrono v0.4.41
[INFO] [stderr]    Compiling parse-zoneinfo v0.3.1
[INFO] [stderr]     Checking tokio-util v0.7.15
[INFO] [stderr]     Checking tower v0.5.2
[INFO] [stderr]     Checking async-compression v0.4.23
[INFO] [stderr]     Checking gix-credentials v0.29.0
[INFO] [stderr]     Checking csv v1.3.1
[INFO] [stderr]     Checking platforms v3.6.0
[INFO] [stderr]     Checking gix-revwalk v0.20.1
[INFO] [stderr]     Checking gix-ref v0.52.1
[INFO] [stderr]     Checking gix-pack v0.59.1
[INFO] [stderr]     Checking tower-http v0.6.6
[INFO] [stderr]     Checking gix-filter v0.19.2
[INFO] [stderr]    Compiling chrono-tz-build v0.3.0
[INFO] [stderr]     Checking gix-revision v0.34.1
[INFO] [stderr]     Checking h2 v0.4.10
[INFO] [stderr]     Checking gix-traverse v0.46.2
[INFO] [stderr]     Checking gix-negotiate v0.20.1
[INFO] [stderr]     Checking gix-diff v0.52.1
[INFO] [stderr]     Checking time v0.3.41
[INFO] [stderr]    Compiling pest_derive v2.8.0
[INFO] [stderr]     Checking cvss v2.0.0
[INFO] [stderr]     Checking rand v0.8.5
[INFO] [stderr]     Checking gix-refspec v0.30.1
[INFO] [stderr]    Compiling chrono-tz v0.9.0
[INFO] [stderr]     Checking rustls-webpki v0.103.3
[INFO] [stderr]     Checking gix-index v0.40.1
[INFO] [stderr]     Checking tokio-native-tls v0.3.1
[INFO] [stderr]     Checking term v0.7.0
[INFO] [stderr]     Checking console v0.16.0
[INFO] [stderr]     Checking toml_parser v1.0.2
[INFO] [stderr]     Checking serde_spanned v1.0.1
[INFO] [stderr]     Checking toml_datetime v0.7.1
[INFO] [stderr]     Checking crossbeam-queue v0.3.12
[INFO] [stderr]     Checking is-terminal v0.4.16
[INFO] [stderr]     Checking wait-timeout v0.2.1
[INFO] [stderr]     Checking encode_unicode v1.0.0
[INFO] [stderr]     Checking predicates-core v1.0.9
[INFO] [stderr]     Checking crossbeam v0.8.4
[INFO] [stderr]     Checking indicatif v0.17.12
[INFO] [stderr]     Checking textwrap v0.16.2
[INFO] [stderr]     Checking serde_yaml v0.9.34+deprecated
[INFO] [stderr]     Checking gix-config v0.45.1
[INFO] [stderr]     Checking gix-discover v0.40.1
[INFO] [stderr]     Checking clap v4.5.44
[INFO] [stderr]     Checking toml v0.9.6
[INFO] [stderr]     Checking gix-odb v0.69.1
[INFO] [stderr]     Checking toml v0.8.23
[INFO] [stderr]     Checking env_logger v0.11.8
[INFO] [stderr]     Checking prettytable v0.10.0
[INFO] [stderr]     Checking dirs v6.0.0
[INFO] [stderr]     Checking float-cmp v0.10.0
[INFO] [stderr]     Checking gix-worktree v0.41.0
[INFO] [stderr]     Checking dashmap v6.1.0
[INFO] [stderr]     Checking uuid v1.18.1
[INFO] [stderr]     Checking term_size v0.3.2
[INFO] [stderr]     Checking num_cpus v1.17.0
[INFO] [stderr]     Checking termtree v0.5.1
[INFO] [stderr]     Checking normalize-line-endings v0.3.0
[INFO] [stderr]     Checking simdutf8 v0.1.5
[INFO] [stderr]     Checking gix-worktree-state v0.19.0
[INFO] [stderr]    Compiling assert_cmd v2.0.17
[INFO] [stderr]     Checking difflib v0.4.0
[INFO] [stderr]     Checking predicates-tree v1.0.12
[INFO] [stderr]     Checking rusty-fork v0.3.0
[INFO] [stderr]     Checking rand v0.9.1
[INFO] [stderr]     Checking rand_xorshift v0.4.0
[INFO] [stderr]     Checking rand_chacha v0.9.0
[INFO] [stderr]     Checking cargo-lock v10.1.0
[INFO] [stderr]     Checking predicates v3.1.3
[INFO] [stderr]     Checking proptest v1.7.0
[INFO] [stderr]     Checking gix-submodule v0.19.1
[INFO] [stderr]     Checking hyper v1.6.0
[INFO] [stderr]     Checking hyper-util v0.1.14
[INFO] [stderr]     Checking tokio-rustls v0.26.2
[INFO] [stderr]     Checking tera v1.20.0
[INFO] [stderr]     Checking hyper-tls v0.6.0
[INFO] [stderr]     Checking hyper-rustls v0.27.6
[INFO] [stderr]     Checking reqwest v0.12.23
[INFO] [stderr]     Checking gix-transport v0.47.0
[INFO] [stderr]     Checking gix-protocol v0.50.1
[INFO] [stderr]     Checking gix v0.72.1
[INFO] [stderr]     Checking tame-index v0.22.0
[INFO] [stderr]     Checking rustsec v0.30.4
[INFO] [stderr]     Checking syncable-cli v0.18.5 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused variable: `package_name`
[INFO] [stdout]    --> src/analyzer/vulnerability/checkers/javascript.rs:484:29
[INFO] [stdout]     |
[INFO] [stdout] 484 |                         let package_name = advisory_obj
[INFO] [stdout]     |                             ^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_package_name`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `findings`
[INFO] [stdout]    --> src/analyzer/vulnerability/checkers/javascript.rs:583:21
[INFO] [stdout]     |
[INFO] [stdout] 583 |         if let Some(findings) = audit_data.get("audit").or_else(|| audit_data.get("metadata")).or_else(|| audit_data.get("data")) {
[INFO] [stdout]     |                     ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_findings`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `package_name`
[INFO] [stdout]    --> src/analyzer/vulnerability/checkers/javascript.rs:484:29
[INFO] [stdout]     |
[INFO] [stdout] 484 |                         let package_name = advisory_obj
[INFO] [stdout]     |                             ^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_package_name`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `findings`
[INFO] [stdout]    --> src/analyzer/vulnerability/checkers/javascript.rs:583:21
[INFO] [stdout]     |
[INFO] [stdout] 583 |         if let Some(findings) = audit_data.get("audit").or_else(|| audit_data.get("metadata")).or_else(|| audit_data.get("data")) {
[INFO] [stdout]     |                     ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_findings`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `name` and `has_api` are never read
[INFO] [stdout]  --> src/analyzer/context/microservices.rs:7:9
[INFO] [stdout]   |
[INFO] [stdout] 6 | pub(crate) struct MicroserviceInfo {
[INFO] [stdout]   |                   ---------------- fields in this struct
[INFO] [stdout] 7 |     pub name: String,
[INFO] [stdout]   |         ^^^^
[INFO] [stdout] 8 |     pub has_db: bool,
[INFO] [stdout] 9 |     pub has_api: bool,
[INFO] [stdout]   |         ^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `MicroserviceInfo` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]   = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: multiple fields are never read
[INFO] [stdout]    --> src/analyzer/security_analyzer.rs:186:5
[INFO] [stdout]     |
[INFO] [stdout] 185 | struct SecurityRule {
[INFO] [stdout]     |        ------------ fields in this struct
[INFO] [stdout] 186 |     id: String,
[INFO] [stdout]     |     ^^
[INFO] [stdout] 187 |     name: String,
[INFO] [stdout]     |     ^^^^
[INFO] [stdout] 188 |     pattern: Regex,
[INFO] [stdout]     |     ^^^^^^^
[INFO] [stdout] 189 |     severity: SecuritySeverity,
[INFO] [stdout]     |     ^^^^^^^^
[INFO] [stdout] 190 |     category: SecurityCategory,
[INFO] [stdout]     |     ^^^^^^^^
[INFO] [stdout] 191 |     description: String,
[INFO] [stdout]     |     ^^^^^^^^^^^
[INFO] [stdout] 192 |     remediation: Vec<String>,
[INFO] [stdout]     |     ^^^^^^^^^^^
[INFO] [stdout] 193 |     cwe_id: Option<String>,
[INFO] [stdout]     |     ^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: multiple methods are never used
[INFO] [stdout]     --> src/analyzer/security_analyzer.rs:971:8
[INFO] [stdout]      |
[INFO] [stdout]  196 | impl SecurityAnalyzer {
[INFO] [stdout]      | --------------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout]  971 |     fn analyze_infrastructure_security_with_progress(&self, project_root: &Path, _technologies: &[DetectedTechnology], multi_progr...
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1017 |     fn analyze_infrastructure_security(&self, project_root: &Path, _technologies: &[DetectedTechnology]) -> Result<Vec<SecurityFin...
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1067 |     fn analyze_framework_security_with_progress(&self, project_root: &Path, technologies: &[DetectedTechnology], multi_progress: &...
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1131 |     fn analyze_framework_security(&self, project_root: &Path, technologies: &[DetectedTechnology]) -> Result<Vec<SecurityFinding>,...
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1518 |     fn analyze_express_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1523 |     fn analyze_django_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1528 |     fn analyze_spring_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1533 |     fn analyze_nextjs_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1538 |     fn analyze_dockerfile_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1543 |     fn analyze_compose_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1548 |     fn analyze_cicd_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1737 |     fn assess_compliance(&self, _findings: &[SecurityFinding], _technologies: &[DetectedTechnology]) -> HashMap<String, Compliance...
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `key` is never read
[INFO] [stdout]   --> src/analyzer/security/turbo/cache.rs:47:5
[INFO] [stdout]    |
[INFO] [stdout] 46 | struct CachedEntry {
[INFO] [stdout]    |        ----------- field in this struct
[INFO] [stdout] 47 |     key: CacheKey,
[INFO] [stdout]    |     ^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `CachedEntry` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `name` and `has_api` are never read
[INFO] [stdout]  --> src/analyzer/context/microservices.rs:7:9
[INFO] [stdout]   |
[INFO] [stdout] 6 | pub(crate) struct MicroserviceInfo {
[INFO] [stdout]   |                   ---------------- fields in this struct
[INFO] [stdout] 7 |     pub name: String,
[INFO] [stdout]   |         ^^^^
[INFO] [stdout] 8 |     pub has_db: bool,
[INFO] [stdout] 9 |     pub has_api: bool,
[INFO] [stdout]   |         ^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `MicroserviceInfo` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]   = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: multiple fields are never read
[INFO] [stdout]    --> src/analyzer/security_analyzer.rs:186:5
[INFO] [stdout]     |
[INFO] [stdout] 185 | struct SecurityRule {
[INFO] [stdout]     |        ------------ fields in this struct
[INFO] [stdout] 186 |     id: String,
[INFO] [stdout]     |     ^^
[INFO] [stdout] 187 |     name: String,
[INFO] [stdout]     |     ^^^^
[INFO] [stdout] 188 |     pattern: Regex,
[INFO] [stdout]     |     ^^^^^^^
[INFO] [stdout] 189 |     severity: SecuritySeverity,
[INFO] [stdout]     |     ^^^^^^^^
[INFO] [stdout] 190 |     category: SecurityCategory,
[INFO] [stdout]     |     ^^^^^^^^
[INFO] [stdout] 191 |     description: String,
[INFO] [stdout]     |     ^^^^^^^^^^^
[INFO] [stdout] 192 |     remediation: Vec<String>,
[INFO] [stdout]     |     ^^^^^^^^^^^
[INFO] [stdout] 193 |     cwe_id: Option<String>,
[INFO] [stdout]     |     ^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: multiple methods are never used
[INFO] [stdout]     --> src/analyzer/security_analyzer.rs:971:8
[INFO] [stdout]      |
[INFO] [stdout]  196 | impl SecurityAnalyzer {
[INFO] [stdout]      | --------------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout]  971 |     fn analyze_infrastructure_security_with_progress(&self, project_root: &Path, _technologies: &[DetectedTechnology], multi_progr...
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1017 |     fn analyze_infrastructure_security(&self, project_root: &Path, _technologies: &[DetectedTechnology]) -> Result<Vec<SecurityFin...
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1067 |     fn analyze_framework_security_with_progress(&self, project_root: &Path, technologies: &[DetectedTechnology], multi_progress: &...
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1131 |     fn analyze_framework_security(&self, project_root: &Path, technologies: &[DetectedTechnology]) -> Result<Vec<SecurityFinding>,...
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1518 |     fn analyze_express_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1523 |     fn analyze_django_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1528 |     fn analyze_spring_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1533 |     fn analyze_nextjs_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1538 |     fn analyze_dockerfile_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1543 |     fn analyze_compose_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1548 |     fn analyze_cicd_security(&self, _project_root: &Path) -> Result<Vec<SecurityFinding>, SecurityError> {
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 1737 |     fn assess_compliance(&self, _findings: &[SecurityFinding], _technologies: &[DetectedTechnology]) -> HashMap<String, Compliance...
[INFO] [stdout]      |        ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `key` is never read
[INFO] [stdout]   --> src/analyzer/security/turbo/cache.rs:47:5
[INFO] [stdout]    |
[INFO] [stdout] 46 | struct CachedEntry {
[INFO] [stdout]    |        ----------- field in this struct
[INFO] [stdout] 47 |     key: CacheKey,
[INFO] [stdout]    |     ^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `CachedEntry` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused imports: `DependencyInfo` and `DependencyType`
[INFO] [stdout]  --> tests/integration_bun_audit.rs:7:43
[INFO] [stdout]   |
[INFO] [stdout] 7 |     dependency_parser::{DependencyParser, DependencyInfo, DependencyType, Language},
[INFO] [stdout]   |                                           ^^^^^^^^^^^^^^  ^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: comparison is useless due to type limits
[INFO] [stdout]   --> tests/integration_bun_audit.rs:61:13
[INFO] [stdout]    |
[INFO] [stdout] 61 |     assert!(vulnerability_report.total_vulnerabilities >= 0);
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_comparisons)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: comparison is useless due to type limits
[INFO] [stdout]   --> tests/integration_bun_audit.rs:62:13
[INFO] [stdout]    |
[INFO] [stdout] 62 |     assert!(vulnerability_report.critical_count >= 0);
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: comparison is useless due to type limits
[INFO] [stdout]   --> tests/integration_bun_audit.rs:63:13
[INFO] [stdout]    |
[INFO] [stdout] 63 |     assert!(vulnerability_report.high_count >= 0);
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: comparison is useless due to type limits
[INFO] [stdout]   --> tests/integration_bun_audit.rs:64:13
[INFO] [stdout]    |
[INFO] [stdout] 64 |     assert!(vulnerability_report.medium_count >= 0);
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: comparison is useless due to type limits
[INFO] [stdout]   --> tests/integration_bun_audit.rs:65:13
[INFO] [stdout]    |
[INFO] [stdout] 65 |     assert!(vulnerability_report.low_count >= 0);
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: comparison is useless due to type limits
[INFO] [stdout]    --> tests/integration_bun_audit.rs:190:13
[INFO] [stdout]     |
[INFO] [stdout] 190 |     assert!(vulnerability_report.total_vulnerabilities >= 0);
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 1m 18s
[INFO] running `Command { std: "docker" "inspect" "d9d4d21afe63456d2897c978538080c65a98b9f1e222996e2dfa17f9f83adb17", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "d9d4d21afe63456d2897c978538080c65a98b9f1e222996e2dfa17f9f83adb17", kill_on_drop: false }`
[INFO] [stdout] d9d4d21afe63456d2897c978538080c65a98b9f1e222996e2dfa17f9f83adb17
