[INFO] cloning repository https://github.com/nicholasklick/sast
[INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/nicholasklick/sast" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fnicholasklick%2Fsast", kill_on_drop: false }`
[INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fnicholasklick%2Fsast'...
[INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }`
[INFO] [stdout] adccaf07ac4f6696344d424895a867dfdb34583d
[INFO] checking nicholasklick/sast against try#78c81ee3917a99dcff6e2e6822800f0492c415c3 for pr-148967
[INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fnicholasklick%2Fsast" "/workspace/builds/worker-1-tc2/source", kill_on_drop: false }`
[INFO] [stderr] Cloning into '/workspace/builds/worker-1-tc2/source'...
[INFO] [stderr] done.
[INFO] started tweaking git repo https://github.com/nicholasklick/sast
[INFO] finished tweaking git repo https://github.com/nicholasklick/sast
[INFO] tweaked toml for git repo https://github.com/nicholasklick/sast written to /workspace/builds/worker-1-tc2/source/Cargo.toml
[INFO] validating manifest of git repo https://github.com/nicholasklick/sast on toolchain 78c81ee3917a99dcff6e2e6822800f0492c415c3
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+78c81ee3917a99dcff6e2e6822800f0492c415c3" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate git repo https://github.com/nicholasklick/sast already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+78c81ee3917a99dcff6e2e6822800f0492c415c3" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+78c81ee3917a99dcff6e2e6822800f0492c415c3" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 04423c8fa2dd9c3cccfa7c35433e0a1d7762180b6a841cfd369cd084c74ab505
[INFO] running `Command { std: "docker" "start" "-a" "04423c8fa2dd9c3cccfa7c35433e0a1d7762180b6a841cfd369cd084c74ab505", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "04423c8fa2dd9c3cccfa7c35433e0a1d7762180b6a841cfd369cd084c74ab505", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "04423c8fa2dd9c3cccfa7c35433e0a1d7762180b6a841cfd369cd084c74ab505", kill_on_drop: false }`
[INFO] [stdout] 04423c8fa2dd9c3cccfa7c35433e0a1d7762180b6a841cfd369cd084c74ab505
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+78c81ee3917a99dcff6e2e6822800f0492c415c3" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] f7d81362e3be9f90c2230253e032443abd7774c27d28c4831603ddc4dc6220e9
[INFO] running `Command { std: "docker" "start" "-a" "f7d81362e3be9f90c2230253e032443abd7774c27d28c4831603ddc4dc6220e9", kill_on_drop: false }`
[INFO] [stderr]    Compiling find-msvc-tools v0.1.4
[INFO] [stderr]     Checking tree-sitter-language v0.1.5
[INFO] [stderr]     Checking regex-syntax v0.8.8
[INFO] [stderr]     Checking streaming-iterator v0.1.9
[INFO] [stderr]     Checking aho-corasick v1.1.4
[INFO] [stderr]     Checking bumpalo v3.19.0
[INFO] [stderr]    Compiling zerocopy v0.8.27
[INFO] [stderr]     Checking smallvec v1.15.1
[INFO] [stderr]     Checking fixedbitset v0.4.2
[INFO] [stderr]     Checking indexmap v2.12.0
[INFO] [stderr]    Compiling thiserror-impl v1.0.69
[INFO] [stderr]    Compiling zerocopy-derive v0.8.27
[INFO] [stderr]     Checking serde v1.0.228
[INFO] [stderr]     Checking serde_json v1.0.145
[INFO] [stderr]     Checking is_terminal_polyfill v1.70.2
[INFO] [stderr]     Checking clap_lex v0.7.6
[INFO] [stderr]    Compiling cc v1.2.45
[INFO] [stderr]     Checking anstream v0.6.21
[INFO] [stderr]    Compiling clap_derive v4.5.49
[INFO] [stderr]     Checking ciborium-io v0.2.2
[INFO] [stderr]     Checking parking_lot_core v0.9.12
[INFO] [stderr]     Checking plotters-backend v0.3.7
[INFO] [stderr]     Checking rayon v1.11.0
[INFO] [stderr]     Checking dashmap v6.1.0
[INFO] [stderr]     Checking itertools v0.10.5
[INFO] [stderr]     Checking wait-timeout v0.2.1
[INFO] [stderr]     Checking clap_builder v4.5.51
[INFO] [stderr]     Checking rand_xorshift v0.4.0
[INFO] [stderr]     Checking plotters-svg v0.3.7
[INFO] [stderr]     Checking rusty-fork v0.3.1
[INFO] [stderr]     Checking rand v0.9.2
[INFO] [stderr]     Checking is-terminal v0.4.17
[INFO] [stderr]     Checking plotters v0.3.7
[INFO] [stderr]    Compiling beef v0.5.2
[INFO] [stderr]    Compiling lazy_static v1.5.0
[INFO] [stderr]     Checking oorandom v11.1.5
[INFO] [stderr]     Checking anes v0.1.6
[INFO] [stderr]     Checking nom v7.1.3
[INFO] [stderr]    Compiling logos-codegen v0.14.4
[INFO] [stderr]     Checking petgraph v0.6.5
[INFO] [stderr]     Checking tinytemplate v1.2.1
[INFO] [stderr]     Checking generic-array v0.14.7
[INFO] [stderr]     Checking bstr v1.12.1
[INFO] [stderr]     Checking chrono v0.4.42
[INFO] [stderr]     Checking tracing v0.1.41
[INFO] [stderr]     Checking colored v2.2.0
[INFO] [stderr]     Checking bincode v1.3.3
[INFO] [stderr]     Checking thiserror v1.0.69
[INFO] [stderr]     Checking unicode-width v0.2.2
[INFO] [stderr]     Checking block-buffer v0.10.4
[INFO] [stderr]     Checking crypto-common v0.1.7
[INFO] [stderr]     Checking portable-atomic v1.11.1
[INFO] [stderr]     Checking digest v0.10.7
[INFO] [stderr]     Checking console v0.15.11
[INFO] [stderr]     Checking criterion-plot v0.5.0
[INFO] [stderr]     Checking tracing-log v0.2.0
[INFO] [stderr]     Checking parking_lot v0.12.5
[INFO] [stderr]     Checking regex-automata v0.4.13
[INFO] [stderr]    Compiling tokio-macros v2.6.0
[INFO] [stderr]     Checking thread_local v1.1.9
[INFO] [stderr]     Checking sha2 v0.10.9
[INFO] [stderr]    Compiling tree-sitter v0.24.7
[INFO] [stderr]    Compiling tree-sitter-python v0.23.6
[INFO] [stderr]    Compiling tree-sitter-ruby v0.23.1
[INFO] [stderr]    Compiling tree-sitter-c v0.23.4
[INFO] [stderr]    Compiling tree-sitter-php v0.23.11
[INFO] [stderr]    Compiling tree-sitter-groovy v0.1.2
[INFO] [stderr]    Compiling tree-sitter-scala v0.24.0
[INFO] [stderr]    Compiling tree-sitter-rust v0.23.3
[INFO] [stderr]    Compiling tree-sitter-kotlin-ng v1.1.0
[INFO] [stderr]    Compiling tree-sitter-c-sharp v0.23.1
[INFO] [stderr]    Compiling tree-sitter-swift v0.6.0
[INFO] [stderr]    Compiling tree-sitter-typescript v0.23.2
[INFO] [stderr]    Compiling tree-sitter-javascript v0.23.1
[INFO] [stderr]    Compiling tree-sitter-java v0.23.5
[INFO] [stderr]    Compiling tree-sitter-cpp v0.23.4
[INFO] [stderr]    Compiling tree-sitter-go v0.23.4
[INFO] [stderr]     Checking clap v4.5.51
[INFO] [stderr]    Compiling logos-derive v0.14.4
[INFO] [stderr]    Compiling blake3 v1.8.2
[INFO] [stderr]     Checking logos v0.14.4
[INFO] [stderr]     Checking nu-ansi-term v0.50.3
[INFO] [stderr]     Checking tokio v1.48.0
[INFO] [stderr]     Checking indicatif v0.17.11
[INFO] [stderr]     Checking half v2.7.1
[INFO] [stderr]     Checking ppv-lite86 v0.2.21
[INFO] [stderr]     Checking tracing-subscriber v0.3.20
[INFO] [stderr]     Checking ciborium-ll v0.2.2
[INFO] [stderr]     Checking ciborium v0.2.2
[INFO] [stderr]     Checking yansi v1.0.1
[INFO] [stderr]     Checking diff v0.1.13
[INFO] [stderr]     Checking rand_chacha v0.9.0
[INFO] [stderr]     Checking regex v1.12.2
[INFO] [stderr]     Checking globset v0.4.18
[INFO] [stderr]     Checking ignore v0.4.25
[INFO] [stderr]     Checking proptest v1.9.0
[INFO] [stderr]     Checking pretty_assertions v1.4.1
[INFO] [stderr]     Checking criterion v0.5.1
[INFO] [stderr]     Checking kodecd-parser v0.1.0 (/opt/rustwide/workdir/crates/parser)
[INFO] [stdout] warning: unused variable: `ast`
[INFO] [stdout]    --> crates/parser/src/parser_arena.rs:535:13
[INFO] [stdout]     |
[INFO] [stdout] 535 |         let ast = parser.parse_source(&arena, source).unwrap();
[INFO] [stdout]     |             ^^^ help: if this is intentional, prefix it with an underscore: `_ast`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Checking kodecd-analyzer v0.1.0 (/opt/rustwide/workdir/crates/analyzer)
[INFO] [stdout] warning: unused import: `AstNodeKind`
[INFO] [stdout]  --> crates/analyzer/src/taint.rs:6:35
[INFO] [stdout]   |
[INFO] [stdout] 6 | use kodecd_parser::ast::{AstNode, AstNodeKind, NodeId};
[INFO] [stdout]   |                                   ^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `HashMap`
[INFO] [stdout]  --> crates/analyzer/src/taint.rs:8:24
[INFO] [stdout]   |
[INFO] [stdout] 8 | use std::collections::{HashMap, HashSet};
[INFO] [stdout]   |                        ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused imports: `CfgNodeKind` and `CfgNode`
[INFO] [stdout]  --> crates/analyzer/src/taint_ast_based.rs:7:33
[INFO] [stdout]   |
[INFO] [stdout] 7 | use crate::cfg::{CfgGraphIndex, CfgNode, CfgNodeKind, ControlFlowGraph};
[INFO] [stdout]   |                                 ^^^^^^^  ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `LiteralValue`
[INFO] [stdout]  --> crates/analyzer/src/taint_ast_based.rs:9:48
[INFO] [stdout]   |
[INFO] [stdout] 9 | use kodecd_parser::ast::{AstNode, AstNodeKind, LiteralValue, NodeId};
[INFO] [stdout]   |                                                ^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:294:6
[INFO] [stdout]     |
[INFO] [stdout] 294 | impl OwnedTaintTransferFunction {
[INFO] [stdout]     |      ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(deprecated)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:368:39
[INFO] [stdout]     |
[INFO] [stdout] 368 | impl TransferFunction<TaintValue> for OwnedTaintTransferFunction {
[INFO] [stdout]     |                                       ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `AstNodeKind`
[INFO] [stdout]  --> crates/analyzer/src/taint.rs:6:35
[INFO] [stdout]   |
[INFO] [stdout] 6 | use kodecd_parser::ast::{AstNode, AstNodeKind, NodeId};
[INFO] [stdout]   |                                   ^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `HashMap`
[INFO] [stdout]  --> crates/analyzer/src/taint.rs:8:24
[INFO] [stdout]   |
[INFO] [stdout] 8 | use std::collections::{HashMap, HashSet};
[INFO] [stdout]   |                        ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused imports: `CfgNodeKind` and `CfgNode`
[INFO] [stdout]  --> crates/analyzer/src/taint_ast_based.rs:7:33
[INFO] [stdout]   |
[INFO] [stdout] 7 | use crate::cfg::{CfgGraphIndex, CfgNode, CfgNodeKind, ControlFlowGraph};
[INFO] [stdout]   |                                 ^^^^^^^  ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:294:6
[INFO] [stdout]     |
[INFO] [stdout] 294 | impl OwnedTaintTransferFunction {
[INFO] [stdout]     |      ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(deprecated)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:368:39
[INFO] [stdout]     |
[INFO] [stdout] 368 | impl TransferFunction<TaintValue> for OwnedTaintTransferFunction {
[INFO] [stdout]     |                                       ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:572:24
[INFO] [stdout]     |
[INFO] [stdout] 572 |         let transfer = OwnedTaintTransferFunction {
[INFO] [stdout]     |                        ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:592:24
[INFO] [stdout]     |
[INFO] [stdout] 592 |         let transfer = OwnedTaintTransferFunction {
[INFO] [stdout]     |                        ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:298:24
[INFO] [stdout]     |
[INFO] [stdout] 298 |         for source in &self.sources {
[INFO] [stdout]     |                        ^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:640:24
[INFO] [stdout]     |
[INFO] [stdout] 640 |         let transfer = OwnedTaintTransferFunction {
[INFO] [stdout]     |                        ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:680:24
[INFO] [stdout]     |
[INFO] [stdout] 680 |         let transfer = OwnedTaintTransferFunction {
[INFO] [stdout]     |                        ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:747:24
[INFO] [stdout]     |
[INFO] [stdout] 747 |         let transfer = OwnedTaintTransferFunction {
[INFO] [stdout]     |                        ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:782:24
[INFO] [stdout]     |
[INFO] [stdout] 782 |         let transfer = OwnedTaintTransferFunction {
[INFO] [stdout]     |                        ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:311:9
[INFO] [stdout]     |
[INFO] [stdout] 311 |         self.sanitizers.iter().any(|san| name_lower.contains(&san.to_lowercase()))
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:298:24
[INFO] [stdout]     |
[INFO] [stdout] 298 |         for source in &self.sources {
[INFO] [stdout]     |                        ^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:311:9
[INFO] [stdout]     |
[INFO] [stdout] 311 |         self.sanitizers.iter().any(|san| name_lower.contains(&san.to_lowercase()))
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:573:13
[INFO] [stdout]     |
[INFO] [stdout] 573 |             sources,
[INFO] [stdout]     |             ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:574:13
[INFO] [stdout]     |
[INFO] [stdout] 574 |             sanitizers: HashSet::new(),
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:593:13
[INFO] [stdout]     |
[INFO] [stdout] 593 |             sources: Vec::new(),
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:594:13
[INFO] [stdout]     |
[INFO] [stdout] 594 |             sanitizers,
[INFO] [stdout]     |             ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:641:13
[INFO] [stdout]     |
[INFO] [stdout] 641 |             sources,
[INFO] [stdout]     |             ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:642:13
[INFO] [stdout]     |
[INFO] [stdout] 642 |             sanitizers: HashSet::new(),
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:681:13
[INFO] [stdout]     |
[INFO] [stdout] 681 |             sources: Vec::new(),
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:682:13
[INFO] [stdout]     |
[INFO] [stdout] 682 |             sanitizers,
[INFO] [stdout]     |             ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:748:13
[INFO] [stdout]     |
[INFO] [stdout] 748 |             sources: Vec::new(),
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:749:13
[INFO] [stdout]     |
[INFO] [stdout] 749 |             sanitizers: HashSet::new(),
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:783:13
[INFO] [stdout]     |
[INFO] [stdout] 783 |             sources: Vec::new(),
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions.
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:784:13
[INFO] [stdout]     |
[INFO] [stdout] 784 |             sanitizers: HashSet::new(),
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `ast`
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:369:48
[INFO] [stdout]     |
[INFO] [stdout] 369 |     fn transfer(&self, cfg: &ControlFlowGraph, ast: &AstNode, node_idx: CfgGraphIndex, input: &HashSet<TaintValue>) -> HashSet<Tain...
[INFO] [stdout]     |                                                ^^^ help: if this is intentional, prefix it with an underscore: `_ast`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `ast`
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:369:48
[INFO] [stdout]     |
[INFO] [stdout] 369 |     fn transfer(&self, cfg: &ControlFlowGraph, ast: &AstNode, node_idx: CfgGraphIndex, input: &HashSet<TaintValue>) -> HashSet<Tain...
[INFO] [stdout]     |                                                ^^^ help: if this is intentional, prefix it with an underscore: `_ast`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: struct `OwnedTaintTransferFunction` is never constructed
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:289:8
[INFO] [stdout]     |
[INFO] [stdout] 289 | struct OwnedTaintTransferFunction {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `is_source`, `is_sanitizer`, `extract_assigned_variable`, `extract_callee`, and `extract_referenced_variables` are never used
[INFO] [stdout]    --> crates/analyzer/src/taint.rs:296:8
[INFO] [stdout]     |
[INFO] [stdout] 294 | impl OwnedTaintTransferFunction {
[INFO] [stdout]     | ------------------------------- methods in this implementation
[INFO] [stdout] 295 |     /// Check if a name matches any taint source (case-insensitive)
[INFO] [stdout] 296 |     fn is_source(&self, name: &str) -> Option<TaintSourceKind> {
[INFO] [stdout]     |        ^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 309 |     fn is_sanitizer(&self, name: &str) -> bool {
[INFO] [stdout]     |        ^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 315 |     fn extract_assigned_variable(&self, node: &CfgNode) -> Option<String> {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 334 |     fn extract_callee(&self, node: &CfgNode) -> Option<String> {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 345 |     fn extract_referenced_variables(&self, node: &CfgNode) -> Vec<String> {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: associated function `build_ast_map` is never used
[INFO] [stdout]   --> crates/analyzer/src/taint_ast_based.rs:27:8
[INFO] [stdout]    |
[INFO] [stdout] 18 | impl AstBasedTaintTransferFunction {
[INFO] [stdout]    | ---------------------------------- associated function in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 27 |     fn build_ast_map<'a>(node: &'a AstNode, map: &mut HashMap<NodeId, &'a AstNode>) {
[INFO] [stdout]    |        ^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `max_loop_iterations` is never read
[INFO] [stdout]    --> crates/analyzer/src/symbolic.rs:456:5
[INFO] [stdout]     |
[INFO] [stdout] 453 | pub struct SymbolicExecutor {
[INFO] [stdout]     |            ---------------- field in this struct
[INFO] [stdout] ...
[INFO] [stdout] 456 |     max_loop_iterations: usize,
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variant `Skip` is never constructed
[INFO] [stdout]    --> crates/analyzer/src/symbolic.rs:707:5
[INFO] [stdout]     |
[INFO] [stdout] 696 | enum ExecutionAction {
[INFO] [stdout]     |      --------------- variant in this enum
[INFO] [stdout] ...
[INFO] [stdout] 707 |     Skip,
[INFO] [stdout]     |     ^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `program`
[INFO] [stdout]    --> crates/analyzer/src/symbol_table.rs:534:13
[INFO] [stdout]     |
[INFO] [stdout] 534 |         let program = AstNode::new(
[INFO] [stdout]     |             ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_program`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Checking kodecd-query v0.1.0 (/opt/rustwide/workdir/crates/query)
[INFO] [stdout] warning: unused imports: `LanguageConfig`, `Language`, and `Parser`
[INFO] [stdout]  --> crates/analyzer/tests/points_to_test.rs:4:21
[INFO] [stdout]   |
[INFO] [stdout] 4 | use kodecd_parser::{Parser, Language, LanguageConfig, AstNode, AstNodeKind, Location, Span};
[INFO] [stdout]   |                     ^^^^^^  ^^^^^^^^  ^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::path::Path`
[INFO] [stdout]  --> crates/analyzer/tests/points_to_test.rs:5:5
[INFO] [stdout]   |
[INFO] [stdout] 5 | use std::path::Path;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `targets`
[INFO] [stdout]    --> crates/analyzer/tests/points_to_test.rs:134:9
[INFO] [stdout]     |
[INFO] [stdout] 134 |     let targets = pts.points_to("obj");
[INFO] [stdout]     |         ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_targets`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `targets`
[INFO] [stdout]    --> crates/analyzer/tests/points_to_test.rs:169:9
[INFO] [stdout]     |
[INFO] [stdout] 169 |     let targets = pts.points_to("arr");
[INFO] [stdout]     |         ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_targets`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: comparison is useless due to type limits
[INFO] [stdout]    --> crates/analyzer/tests/points_to_test.rs:195:13
[INFO] [stdout]     |
[INFO] [stdout] 195 |     assert!(stats.num_locations >= 0);
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_comparisons)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: comparison is useless due to type limits
[INFO] [stdout]    --> crates/analyzer/tests/points_to_test.rs:218:13
[INFO] [stdout]     |
[INFO] [stdout] 218 |     assert!(stats.num_locations >= 0);
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: comparison is useless due to type limits
[INFO] [stdout]    --> crates/analyzer/tests/points_to_test.rs:327:13
[INFO] [stdout]     |
[INFO] [stdout] 327 |     assert!(stats.num_locations >= 0);
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> crates/analyzer/src/interprocedural_taint.rs:556:13
[INFO] [stdout]     |
[INFO] [stdout] 556 |         let mut analysis = InterproceduralTaintAnalysis::new()
[INFO] [stdout]     |             ----^^^^^^^^
[INFO] [stdout]     |             |
[INFO] [stdout]     |             help: remove this `mut`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> crates/analyzer/src/interprocedural_taint.rs:566:13
[INFO] [stdout]     |
[INFO] [stdout] 566 |         let mut analysis = InterproceduralTaintAnalysis::new()
[INFO] [stdout]     |             ----^^^^^^^^
[INFO] [stdout]     |             |
[INFO] [stdout]     |             help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> crates/analyzer/src/interprocedural_taint.rs:576:13
[INFO] [stdout]     |
[INFO] [stdout] 576 |         let mut analysis = InterproceduralTaintAnalysis::new()
[INFO] [stdout]     |             ----^^^^^^^^
[INFO] [stdout]     |             |
[INFO] [stdout]     |             help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `taint`
[INFO] [stdout]    --> crates/analyzer/tests/ruby_taint_test.rs:150:9
[INFO] [stdout]     |
[INFO] [stdout] 150 |     let taint = TaintAnalysis::new().for_language(Language::Ruby);
[INFO] [stdout]     |         ^^^^^ help: if this is intentional, prefix it with an underscore: `_taint`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `taint`
[INFO] [stdout]    --> crates/analyzer/tests/java_taint_test.rs:185:9
[INFO] [stdout]     |
[INFO] [stdout] 185 |     let taint = TaintAnalysis::new().for_language(Language::Java);
[INFO] [stdout]     |         ^^^^^ help: if this is intentional, prefix it with an underscore: `_taint`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: comparison is useless due to type limits
[INFO] [stdout]    --> crates/analyzer/tests/interprocedural_test.rs:341:13
[INFO] [stdout]     |
[INFO] [stdout] 341 |     assert!(result.vulnerabilities.len() >= 0);
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_comparisons)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: comparison is useless due to type limits
[INFO] [stdout]    --> crates/analyzer/tests/taint_integration_test.rs:225:13
[INFO] [stdout]     |
[INFO] [stdout] 225 |     assert!(result.vulnerabilities.len() >= 0);
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_comparisons)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `taint`
[INFO] [stdout]    --> crates/analyzer/tests/php_taint_test.rs:182:9
[INFO] [stdout]     |
[INFO] [stdout] 182 |     let taint = TaintAnalysis::new().for_language(Language::Php);
[INFO] [stdout]     |         ^^^^^ help: if this is intentional, prefix it with an underscore: `_taint`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `taint`
[INFO] [stdout]    --> crates/analyzer/tests/go_taint_test.rs:185:9
[INFO] [stdout]     |
[INFO] [stdout] 185 |     let taint = TaintAnalysis::new().for_language(Language::Go);
[INFO] [stdout]     |         ^^^^^ help: if this is intentional, prefix it with an underscore: `_taint`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `taint`
[INFO] [stdout]    --> crates/analyzer/tests/swift_taint_test.rs:194:9
[INFO] [stdout]     |
[INFO] [stdout] 194 |     let taint = TaintAnalysis::new().for_language(Language::Swift);
[INFO] [stdout]     |         ^^^^^ help: if this is intentional, prefix it with an underscore: `_taint`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `taint`
[INFO] [stdout]    --> crates/analyzer/tests/rust_taint_test.rs:195:9
[INFO] [stdout]     |
[INFO] [stdout] 195 |     let taint = TaintAnalysis::new().for_language(Language::Rust);
[INFO] [stdout]     |         ^^^^^ help: if this is intentional, prefix it with an underscore: `_taint`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: struct `DummyTransfer` is never constructed
[INFO] [stdout]    --> crates/analyzer/src/dataflow.rs:222:12
[INFO] [stdout]     |
[INFO] [stdout] 222 |     struct DummyTransfer;
[INFO] [stdout]     |            ^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: associated function `build_ast_map` is never used
[INFO] [stdout]   --> crates/analyzer/src/taint_ast_based.rs:27:8
[INFO] [stdout]    |
[INFO] [stdout] 18 | impl AstBasedTaintTransferFunction {
[INFO] [stdout]    | ---------------------------------- associated function in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 27 |     fn build_ast_map<'a>(node: &'a AstNode, map: &mut HashMap<NodeId, &'a AstNode>) {
[INFO] [stdout]    |        ^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `max_loop_iterations` is never read
[INFO] [stdout]    --> crates/analyzer/src/symbolic.rs:456:5
[INFO] [stdout]     |
[INFO] [stdout] 453 | pub struct SymbolicExecutor {
[INFO] [stdout]     |            ---------------- field in this struct
[INFO] [stdout] ...
[INFO] [stdout] 456 |     max_loop_iterations: usize,
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variant `Skip` is never constructed
[INFO] [stdout]    --> crates/analyzer/src/symbolic.rs:707:5
[INFO] [stdout]     |
[INFO] [stdout] 696 | enum ExecutionAction {
[INFO] [stdout]     |      --------------- variant in this enum
[INFO] [stdout] ...
[INFO] [stdout] 707 |     Skip,
[INFO] [stdout]     |     ^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `node` is never read
[INFO] [stdout]   --> crates/query/src/executor.rs:32:5
[INFO] [stdout]    |
[INFO] [stdout] 30 | struct EvaluationContext<'a> {
[INFO] [stdout]    |        ----------------- field in this struct
[INFO] [stdout] 31 |     /// The current AST node being evaluated
[INFO] [stdout] 32 |     node: &'a AstNode,
[INFO] [stdout]    |     ^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `as_bool` is never used
[INFO] [stdout]   --> crates/query/src/executor.rs:84:8
[INFO] [stdout]    |
[INFO] [stdout] 74 | impl Value {
[INFO] [stdout]    | ---------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 84 |     fn as_bool(&self) -> bool {
[INFO] [stdout]    |        ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: associated function `evaluate_function_call` is never used
[INFO] [stdout]    --> crates/query/src/executor.rs:516:8
[INFO] [stdout]     |
[INFO] [stdout]  96 | impl QueryExecutor {
[INFO] [stdout]     | ------------------ associated function in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 516 |     fn evaluate_function_call(variable: &str, function: &str, ctx: &EvaluationContext) -> bool {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `node` is never read
[INFO] [stdout]   --> crates/query/src/executor.rs:32:5
[INFO] [stdout]    |
[INFO] [stdout] 30 | struct EvaluationContext<'a> {
[INFO] [stdout]    |        ----------------- field in this struct
[INFO] [stdout] 31 |     /// The current AST node being evaluated
[INFO] [stdout] 32 |     node: &'a AstNode,
[INFO] [stdout]    |     ^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `as_bool` is never used
[INFO] [stdout]   --> crates/query/src/executor.rs:84:8
[INFO] [stdout]    |
[INFO] [stdout] 74 | impl Value {
[INFO] [stdout]    | ---------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 84 |     fn as_bool(&self) -> bool {
[INFO] [stdout]    |        ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: associated function `evaluate_function_call` is never used
[INFO] [stdout]    --> crates/query/src/executor.rs:516:8
[INFO] [stdout]     |
[INFO] [stdout]  96 | impl QueryExecutor {
[INFO] [stdout]     | ------------------ associated function in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 516 |     fn evaluate_function_call(variable: &str, function: &str, ctx: &EvaluationContext) -> bool {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Checking kodecd-cache v0.1.0 (/opt/rustwide/workdir/crates/cache)
[INFO] [stderr]     Checking kodecd-reporter v0.1.0 (/opt/rustwide/workdir/crates/reporter)
[INFO] [stderr]     Checking kodecd-sast v0.1.0 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused variable: `q`
[INFO] [stdout]   --> tests/test_parser.rs:23:12
[INFO] [stdout]    |
[INFO] [stdout] 23 |         Ok(q) => println!("Simple query works!"),
[INFO] [stdout]    |            ^ help: if this is intentional, prefix it with an underscore: `_q`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `failed` is never read
[INFO] [stdout]   --> tests/integration_tests.rs:53:17
[INFO] [stdout]    |
[INFO] [stdout] 53 |                 failed += 1;
[INFO] [stdout]    |                 ^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = help: maybe it is overwritten before being read?
[INFO] [stdout]    = note: `#[warn(unused_assignments)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `failed` is never read
[INFO] [stdout]    --> tests/integration_tests.rs:108:17
[INFO] [stdout]     |
[INFO] [stdout] 108 |                 failed += 1;
[INFO] [stdout]     |                 ^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `node_count` is never read
[INFO] [stdout]    --> tests/integration_tests.rs:337:26
[INFO] [stdout]     |
[INFO] [stdout] 337 |     let mut node_count = 0;
[INFO] [stdout]     |                          ^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Parser`
[INFO] [stdout]  --> tests/test_arena_parser.rs:8:41
[INFO] [stdout]   |
[INFO] [stdout] 8 |     AstArena, Language, LanguageConfig, Parser, ParserArena,
[INFO] [stdout]   |                                         ^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `include_patterns` is never read
[INFO] [stdout]   --> src/discovery.rs:28:9
[INFO] [stdout]    |
[INFO] [stdout] 20 | pub struct DiscoveryConfig {
[INFO] [stdout]    |            --------------- field in this struct
[INFO] [stdout] ...
[INFO] [stdout] 28 |     pub include_patterns: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `DiscoveryConfig` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `file_path` and `error` are never read
[INFO] [stdout]   --> src/parallel.rs:21:9
[INFO] [stdout]    |
[INFO] [stdout] 20 | pub struct FileAnalysisResult {
[INFO] [stdout]    |            ------------------ fields in this struct
[INFO] [stdout] 21 |     pub file_path: PathBuf,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 24 |     pub error: Option<String>,
[INFO] [stdout]    |         ^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `FileAnalysisResult` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `failed_files` is never read
[INFO] [stdout]    --> src/parallel.rs:213:9
[INFO] [stdout]     |
[INFO] [stdout] 210 | pub struct AnalysisStatistics {
[INFO] [stdout]     |            ------------------ field in this struct
[INFO] [stdout] ...
[INFO] [stdout] 213 |     pub failed_files: usize,
[INFO] [stdout]     |         ^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `AnalysisStatistics` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `include_patterns` is never read
[INFO] [stdout]   --> src/discovery.rs:28:9
[INFO] [stdout]    |
[INFO] [stdout] 20 | pub struct DiscoveryConfig {
[INFO] [stdout]    |            --------------- field in this struct
[INFO] [stdout] ...
[INFO] [stdout] 28 |     pub include_patterns: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `DiscoveryConfig` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `file_path` and `error` are never read
[INFO] [stdout]   --> src/parallel.rs:21:9
[INFO] [stdout]    |
[INFO] [stdout] 20 | pub struct FileAnalysisResult {
[INFO] [stdout]    |            ------------------ fields in this struct
[INFO] [stdout] 21 |     pub file_path: PathBuf,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 24 |     pub error: Option<String>,
[INFO] [stdout]    |         ^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `FileAnalysisResult` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `failed_files` is never read
[INFO] [stdout]    --> src/parallel.rs:213:9
[INFO] [stdout]     |
[INFO] [stdout] 210 | pub struct AnalysisStatistics {
[INFO] [stdout]     |            ------------------ field in this struct
[INFO] [stdout] ...
[INFO] [stdout] 213 |     pub failed_files: usize,
[INFO] [stdout]     |         ^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `AnalysisStatistics` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 57.32s
[INFO] running `Command { std: "docker" "inspect" "f7d81362e3be9f90c2230253e032443abd7774c27d28c4831603ddc4dc6220e9", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "f7d81362e3be9f90c2230253e032443abd7774c27d28c4831603ddc4dc6220e9", kill_on_drop: false }`
[INFO] [stdout] f7d81362e3be9f90c2230253e032443abd7774c27d28c4831603ddc4dc6220e9
