[INFO] cloning repository https://github.com/nicholasklick/sast [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/nicholasklick/sast" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fnicholasklick%2Fsast", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fnicholasklick%2Fsast'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] ddac8134b4ab121b0d1aad3a5c084de5cd1b051f [INFO] checking nicholasklick/sast against try#446cb600aa4837dd6c513f14fa0d25a909b177d7 for pr-149195 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fnicholasklick%2Fsast" "/workspace/builds/worker-5-tc2/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-5-tc2/source'... [INFO] [stderr] done. [INFO] started tweaking git repo https://github.com/nicholasklick/sast [INFO] finished tweaking git repo https://github.com/nicholasklick/sast [INFO] tweaked toml for git repo https://github.com/nicholasklick/sast written to /workspace/builds/worker-5-tc2/source/Cargo.toml [INFO] validating manifest of git repo https://github.com/nicholasklick/sast on toolchain 446cb600aa4837dd6c513f14fa0d25a909b177d7 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+446cb600aa4837dd6c513f14fa0d25a909b177d7" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate git repo https://github.com/nicholasklick/sast already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+446cb600aa4837dd6c513f14fa0d25a909b177d7" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:94a0c148923f5b2b52a63ef0eeb1882ad339ab61bce784c8077cbe41c61feb6c" "/opt/rustwide/cargo-home/bin/cargo" "+446cb600aa4837dd6c513f14fa0d25a909b177d7" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 2fe2faaeba87b1acabe92842c7689e89554314d5cf98fe11a9c6afbbe229fa86 [INFO] running `Command { std: "docker" "start" "-a" "2fe2faaeba87b1acabe92842c7689e89554314d5cf98fe11a9c6afbbe229fa86", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "2fe2faaeba87b1acabe92842c7689e89554314d5cf98fe11a9c6afbbe229fa86", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "2fe2faaeba87b1acabe92842c7689e89554314d5cf98fe11a9c6afbbe229fa86", kill_on_drop: false }` [INFO] [stdout] 2fe2faaeba87b1acabe92842c7689e89554314d5cf98fe11a9c6afbbe229fa86 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:94a0c148923f5b2b52a63ef0eeb1882ad339ab61bce784c8077cbe41c61feb6c" "/opt/rustwide/cargo-home/bin/cargo" "+446cb600aa4837dd6c513f14fa0d25a909b177d7" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] cae3809d5beef4a6878c5c434a21f0a78fc10147a1d5db9713988adb25134566 [INFO] running `Command { std: "docker" "start" "-a" "cae3809d5beef4a6878c5c434a21f0a78fc10147a1d5db9713988adb25134566", kill_on_drop: false }` [INFO] [stderr] Compiling find-msvc-tools v0.1.4 [INFO] [stderr] Compiling proc-macro2 v1.0.103 [INFO] [stderr] Compiling unicode-ident v1.0.22 [INFO] [stderr] Compiling quote v1.0.42 [INFO] [stderr] Compiling libc v0.2.177 [INFO] [stderr] Checking cfg-if v1.0.4 [INFO] [stderr] Checking tree-sitter-language v0.1.5 [INFO] [stderr] Checking memchr v2.7.6 [INFO] [stderr] Compiling serde_core v1.0.228 [INFO] [stderr] Compiling serde v1.0.228 [INFO] [stderr] Checking regex-syntax v0.8.8 [INFO] [stderr] Checking streaming-iterator v0.1.9 [INFO] [stderr] Checking walkdir v2.5.0 [INFO] [stderr] Checking bumpalo v3.19.0 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Compiling zerocopy v0.8.27 [INFO] [stderr] Compiling parking_lot_core v0.9.12 [INFO] [stderr] Compiling cc v1.2.45 [INFO] [stderr] Checking lock_api v0.4.14 [INFO] [stderr] Checking hashbrown v0.16.0 [INFO] [stderr] Checking fixedbitset v0.4.2 [INFO] [stderr] Checking hashbrown v0.14.5 [INFO] [stderr] Compiling getrandom v0.3.4 [INFO] [stderr] Compiling serde_json v1.0.145 [INFO] [stderr] Compiling rustix v1.1.2 [INFO] [stderr] Checking anstyle-parse v0.2.7 [INFO] [stderr] Checking is_terminal_polyfill v1.70.2 [INFO] [stderr] Checking anstyle v1.0.13 [INFO] [stderr] Checking bitflags v2.10.0 [INFO] [stderr] Checking aho-corasick v1.1.4 [INFO] [stderr] Checking linux-raw-sys v0.11.0 [INFO] [stderr] Checking colorchoice v1.0.4 [INFO] [stderr] Compiling rayon-core v1.13.0 [INFO] [stderr] Checking anstyle-query v1.1.4 [INFO] [stderr] Checking clap_lex v0.7.6 [INFO] [stderr] Checking fastrand v2.3.0 [INFO] [stderr] Compiling syn v2.0.110 [INFO] [stderr] Checking anstream v0.6.21 [INFO] [stderr] Checking plotters-backend v0.3.7 [INFO] [stderr] Checking ciborium-io v0.2.2 [INFO] [stderr] Checking itertools v0.10.5 [INFO] [stderr] Checking plotters-svg v0.3.7 [INFO] [stderr] Checking cast v0.3.0 [INFO] [stderr] Checking anes v0.1.6 [INFO] [stderr] Checking indexmap v2.12.0 [INFO] [stderr] Checking oorandom v11.1.5 [INFO] [stderr] Checking quick-error v1.2.3 [INFO] [stderr] Checking clap_builder v4.5.51 [INFO] [stderr] Checking bit-vec v0.8.0 [INFO] [stderr] Compiling beef v0.5.2 [INFO] [stderr] Checking bit-set v0.8.0 [INFO] [stderr] Checking unarray v0.1.4 [INFO] [stderr] Compiling fnv v1.0.7 [INFO] [stderr] Checking plotters v0.3.7 [INFO] [stderr] Checking rayon v1.11.0 [INFO] [stderr] Compiling lazy_static v1.5.0 [INFO] [stderr] Compiling typenum v1.19.0 [INFO] [stderr] Checking nom v7.1.3 [INFO] [stderr] Checking bstr v1.12.1 [INFO] [stderr] Compiling anyhow v1.0.100 [INFO] [stderr] Checking is-terminal v0.4.17 [INFO] [stderr] Checking wait-timeout v0.2.1 [INFO] [stderr] Checking dashmap v6.1.0 [INFO] [stderr] Checking rand_core v0.9.3 [INFO] [stderr] Checking petgraph v0.6.5 [INFO] [stderr] Checking arrayref v0.3.9 [INFO] [stderr] Checking constant_time_eq v0.3.1 [INFO] [stderr] Checking rand v0.9.2 [INFO] [stderr] Checking rand_xorshift v0.4.0 [INFO] [stderr] Compiling portable-atomic v1.11.1 [INFO] [stderr] Checking iana-time-zone v0.1.64 [INFO] [stderr] Compiling tree-sitter-java v0.23.5 [INFO] [stderr] Checking regex-automata v0.4.13 [INFO] [stderr] Compiling tree-sitter-rust v0.23.3 [INFO] [stderr] Compiling tree-sitter-kotlin-ng v1.1.0 [INFO] [stderr] Compiling tree-sitter-scala v0.24.0 [INFO] [stderr] Compiling tree-sitter-javascript v0.23.1 [INFO] [stderr] Compiling tree-sitter-cpp v0.23.4 [INFO] [stderr] Compiling tree-sitter-groovy v0.1.2 [INFO] [stderr] Compiling tree-sitter-go v0.23.4 [INFO] [stderr] Compiling tree-sitter-python v0.23.6 [INFO] [stderr] Compiling tree-sitter v0.24.7 [INFO] [stderr] Compiling tree-sitter-c-sharp v0.23.1 [INFO] [stderr] Compiling tree-sitter-c v0.23.4 [INFO] [stderr] Compiling tree-sitter-ruby v0.23.1 [INFO] [stderr] Compiling tree-sitter-php v0.23.11 [INFO] [stderr] Compiling tree-sitter-typescript v0.23.2 [INFO] [stderr] Compiling tree-sitter-swift v0.6.0 [INFO] [stderr] Checking tempfile v3.23.0 [INFO] [stderr] Checking criterion-plot v0.5.0 [INFO] [stderr] Checking rusty-fork v0.3.1 [INFO] [stderr] Checking generic-array v0.14.7 [INFO] [stderr] Compiling blake3 v1.8.2 [INFO] [stderr] Checking regex v1.12.2 [INFO] [stderr] Checking globset v0.4.18 [INFO] [stderr] Checking colored v2.2.0 [INFO] [stderr] Checking unicode-width v0.2.2 [INFO] [stderr] Compiling logos-codegen v0.14.4 [INFO] [stderr] Checking parking_lot v0.12.5 [INFO] [stderr] Checking ignore v0.4.25 [INFO] [stderr] Checking socket2 v0.6.1 [INFO] [stderr] Checking console v0.15.11 [INFO] [stderr] Checking signal-hook-registry v1.4.6 [INFO] [stderr] Checking mio v1.1.0 [INFO] [stderr] Checking crypto-common v0.1.7 [INFO] [stderr] Checking block-buffer v0.10.4 [INFO] [stderr] Checking thread_local v1.1.9 [INFO] [stderr] Checking nu-ansi-term v0.50.3 [INFO] [stderr] Checking digest v0.10.7 [INFO] [stderr] Checking number_prefix v0.4.0 [INFO] [stderr] Checking glob v0.3.3 [INFO] [stderr] Checking yansi v1.0.1 [INFO] [stderr] Checking diff v0.1.13 [INFO] [stderr] Checking sha2 v0.10.9 [INFO] [stderr] Checking indicatif v0.17.11 [INFO] [stderr] Checking tracing-subscriber v0.3.20 [INFO] [stderr] Checking pretty_assertions v1.4.1 [INFO] [stderr] Compiling serde_derive v1.0.228 [INFO] [stderr] Compiling thiserror-impl v1.0.69 [INFO] [stderr] Compiling zerocopy-derive v0.8.27 [INFO] [stderr] Compiling clap_derive v4.5.49 [INFO] [stderr] Compiling tracing-attributes v0.1.30 [INFO] [stderr] Compiling tokio-macros v2.6.0 [INFO] [stderr] Compiling logos-derive v0.14.4 [INFO] [stderr] Checking tokio v1.48.0 [INFO] [stderr] Checking logos v0.14.4 [INFO] [stderr] Checking thiserror v1.0.69 [INFO] [stderr] Checking tracing v0.1.41 [INFO] [stderr] Checking clap v4.5.51 [INFO] [stderr] Checking gittera-parser v0.1.0 (/opt/rustwide/workdir/crates/parser) [INFO] [stderr] Checking tinytemplate v1.2.1 [INFO] [stderr] Checking bincode v1.3.3 [INFO] [stderr] Checking chrono v0.4.42 [INFO] [stderr] Checking half v2.7.1 [INFO] [stderr] Checking ppv-lite86 v0.2.21 [INFO] [stderr] Checking ciborium-ll v0.2.2 [INFO] [stderr] Checking rand_chacha v0.9.0 [INFO] [stderr] Checking proptest v1.9.0 [INFO] [stderr] Checking ciborium v0.2.2 [INFO] [stderr] Checking gittera-analyzer v0.1.0 (/opt/rustwide/workdir/crates/analyzer) [INFO] [stdout] warning: unused import: `AstNodeKind` [INFO] [stdout] --> crates/analyzer/src/taint.rs:7:36 [INFO] [stdout] | [INFO] [stdout] 7 | use gittera_parser::ast::{AstNode, AstNodeKind, NodeId}; [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `HashMap` [INFO] [stdout] --> crates/analyzer/src/taint.rs:9:24 [INFO] [stdout] | [INFO] [stdout] 9 | use std::collections::{HashMap, HashSet}; [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `CfgNodeKind` and `CfgNode` [INFO] [stdout] --> crates/analyzer/src/taint_ast_based.rs:7:33 [INFO] [stdout] | [INFO] [stdout] 7 | use crate::cfg::{CfgGraphIndex, CfgNode, CfgNodeKind, ControlFlowGraph}; [INFO] [stdout] | ^^^^^^^ ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `LiteralValue` [INFO] [stdout] --> crates/analyzer/src/taint_ast_based.rs:9:49 [INFO] [stdout] | [INFO] [stdout] 9 | use gittera_parser::ast::{AstNode, AstNodeKind, LiteralValue, NodeId}; [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:370:6 [INFO] [stdout] | [INFO] [stdout] 370 | impl OwnedTaintTransferFunction { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:444:39 [INFO] [stdout] | [INFO] [stdout] 444 | impl TransferFunction for OwnedTaintTransferFunction { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:374:24 [INFO] [stdout] | [INFO] [stdout] 374 | for source in &self.sources { [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:387:9 [INFO] [stdout] | [INFO] [stdout] 387 | self.sanitizers.iter().any(|san| name_lower.contains(&san.to_lowercase())) [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking criterion v0.5.1 [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> crates/analyzer/src/taint.rs:517:37 [INFO] [stdout] | [INFO] [stdout] 517 | ... let mut new_taint = TaintValue { [INFO] [stdout] | ----^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `ast` [INFO] [stdout] --> crates/analyzer/src/taint.rs:445:48 [INFO] [stdout] | [INFO] [stdout] 445 | fn transfer(&self, cfg: &ControlFlowGraph, ast: &AstNode, node_idx: CfgGraphIndex, input: &HashSet) -> HashSet crates/analyzer/src/taint.rs:365:8 [INFO] [stdout] | [INFO] [stdout] 365 | struct OwnedTaintTransferFunction { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `is_source`, `is_sanitizer`, `extract_assigned_variable`, `extract_callee`, and `extract_referenced_variables` are never used [INFO] [stdout] --> crates/analyzer/src/taint.rs:372:8 [INFO] [stdout] | [INFO] [stdout] 370 | impl OwnedTaintTransferFunction { [INFO] [stdout] | ------------------------------- methods in this implementation [INFO] [stdout] 371 | /// Check if a name matches any taint source (case-insensitive) [INFO] [stdout] 372 | fn is_source(&self, name: &str) -> Option { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 385 | fn is_sanitizer(&self, name: &str) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 391 | fn extract_assigned_variable(&self, node: &CfgNode) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 410 | fn extract_callee(&self, node: &CfgNode) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 421 | fn extract_referenced_variables(&self, node: &CfgNode) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: associated function `build_ast_map` is never used [INFO] [stdout] --> crates/analyzer/src/taint_ast_based.rs:27:8 [INFO] [stdout] | [INFO] [stdout] 18 | impl AstBasedTaintTransferFunction { [INFO] [stdout] | ---------------------------------- associated function in this implementation [INFO] [stdout] ... [INFO] [stdout] 27 | fn build_ast_map<'a>(node: &'a AstNode, map: &mut HashMap) { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `max_loop_iterations` is never read [INFO] [stdout] --> crates/analyzer/src/symbolic.rs:456:5 [INFO] [stdout] | [INFO] [stdout] 453 | pub struct SymbolicExecutor { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] ... [INFO] [stdout] 456 | max_loop_iterations: usize, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `Skip` is never constructed [INFO] [stdout] --> crates/analyzer/src/symbolic.rs:707:5 [INFO] [stdout] | [INFO] [stdout] 696 | enum ExecutionAction { [INFO] [stdout] | --------------- variant in this enum [INFO] [stdout] ... [INFO] [stdout] 707 | Skip, [INFO] [stdout] | ^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking gittera-query v0.1.0 (/opt/rustwide/workdir/crates/query) [INFO] [stdout] warning: unused imports: `LanguageConfig`, `Language`, and `Parser` [INFO] [stdout] --> crates/analyzer/tests/points_to_test.rs:4:22 [INFO] [stdout] | [INFO] [stdout] 4 | use gittera_parser::{Parser, Language, LanguageConfig, AstNode, AstNodeKind, Location, Span}; [INFO] [stdout] | ^^^^^^ ^^^^^^^^ ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `std::path::Path` [INFO] [stdout] --> crates/analyzer/tests/points_to_test.rs:5:5 [INFO] [stdout] | [INFO] [stdout] 5 | use std::path::Path; [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `taint` [INFO] [stdout] --> crates/analyzer/tests/go_taint_test.rs:185:9 [INFO] [stdout] | [INFO] [stdout] 185 | let taint = TaintAnalysis::new().for_language(Language::Go); [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_taint` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `taint` [INFO] [stdout] --> crates/analyzer/tests/php_taint_test.rs:182:9 [INFO] [stdout] | [INFO] [stdout] 182 | let taint = TaintAnalysis::new().for_language(Language::Php); [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_taint` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: comparison is useless due to type limits [INFO] [stdout] --> crates/analyzer/tests/interprocedural_test.rs:341:13 [INFO] [stdout] | [INFO] [stdout] 341 | assert!(result.vulnerabilities.len() >= 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_comparisons)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `TaintSinkKind`, `TaintSink`, and `TaintSource` [INFO] [stdout] --> crates/analyzer/tests/predicated_taint_basic_test.rs:2:32 [INFO] [stdout] | [INFO] [stdout] 2 | CfgBuilder, TaintAnalysis, TaintSink, TaintSinkKind, TaintSource, TaintSourceKind, [INFO] [stdout] | ^^^^^^^^^ ^^^^^^^^^^^^^ ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> crates/analyzer/tests/predicated_taint_basic_test.rs:133:9 [INFO] [stdout] | [INFO] [stdout] 133 | let mut analysis = TaintAnalysis::new() [INFO] [stdout] | ----^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `taint` [INFO] [stdout] --> crates/analyzer/tests/java_taint_test.rs:185:9 [INFO] [stdout] | [INFO] [stdout] 185 | let taint = TaintAnalysis::new().for_language(Language::Java); [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_taint` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `targets` [INFO] [stdout] --> crates/analyzer/tests/points_to_test.rs:134:9 [INFO] [stdout] | [INFO] [stdout] 134 | let targets = pts.points_to("obj"); [INFO] [stdout] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_targets` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `targets` [INFO] [stdout] --> crates/analyzer/tests/points_to_test.rs:169:9 [INFO] [stdout] | [INFO] [stdout] 169 | let targets = pts.points_to("arr"); [INFO] [stdout] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_targets` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `taint` [INFO] [stdout] --> crates/analyzer/tests/ruby_taint_test.rs:150:9 [INFO] [stdout] | [INFO] [stdout] 150 | let taint = TaintAnalysis::new().for_language(Language::Ruby); [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_taint` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: comparison is useless due to type limits [INFO] [stdout] --> crates/analyzer/tests/taint_integration_test.rs:225:13 [INFO] [stdout] | [INFO] [stdout] 225 | assert!(result.vulnerabilities.len() >= 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_comparisons)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: comparison is useless due to type limits [INFO] [stdout] --> crates/analyzer/tests/points_to_test.rs:195:13 [INFO] [stdout] | [INFO] [stdout] 195 | assert!(stats.num_locations >= 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_comparisons)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: comparison is useless due to type limits [INFO] [stdout] --> crates/analyzer/tests/points_to_test.rs:218:13 [INFO] [stdout] | [INFO] [stdout] 218 | assert!(stats.num_locations >= 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: comparison is useless due to type limits [INFO] [stdout] --> crates/analyzer/tests/points_to_test.rs:327:13 [INFO] [stdout] | [INFO] [stdout] 327 | assert!(stats.num_locations >= 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `taint` [INFO] [stdout] --> crates/analyzer/tests/swift_taint_test.rs:194:9 [INFO] [stdout] | [INFO] [stdout] 194 | let taint = TaintAnalysis::new().for_language(Language::Swift); [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_taint` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `taint` [INFO] [stdout] --> crates/analyzer/tests/rust_taint_test.rs:195:9 [INFO] [stdout] | [INFO] [stdout] 195 | let taint = TaintAnalysis::new().for_language(Language::Rust); [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_taint` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `AstNodeKind` [INFO] [stdout] --> crates/analyzer/src/taint.rs:7:36 [INFO] [stdout] | [INFO] [stdout] 7 | use gittera_parser::ast::{AstNode, AstNodeKind, NodeId}; [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `HashMap` [INFO] [stdout] --> crates/analyzer/src/taint.rs:9:24 [INFO] [stdout] | [INFO] [stdout] 9 | use std::collections::{HashMap, HashSet}; [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `CfgNodeKind` and `CfgNode` [INFO] [stdout] --> crates/analyzer/src/taint_ast_based.rs:7:33 [INFO] [stdout] | [INFO] [stdout] 7 | use crate::cfg::{CfgGraphIndex, CfgNode, CfgNodeKind, ControlFlowGraph}; [INFO] [stdout] | ^^^^^^^ ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:370:6 [INFO] [stdout] | [INFO] [stdout] 370 | impl OwnedTaintTransferFunction { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:444:39 [INFO] [stdout] | [INFO] [stdout] 444 | impl TransferFunction for OwnedTaintTransferFunction { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:651:24 [INFO] [stdout] | [INFO] [stdout] 651 | let transfer = OwnedTaintTransferFunction { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:671:24 [INFO] [stdout] | [INFO] [stdout] 671 | let transfer = OwnedTaintTransferFunction { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:719:24 [INFO] [stdout] | [INFO] [stdout] 719 | let transfer = OwnedTaintTransferFunction { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:759:24 [INFO] [stdout] | [INFO] [stdout] 759 | let transfer = OwnedTaintTransferFunction { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:826:24 [INFO] [stdout] | [INFO] [stdout] 826 | let transfer = OwnedTaintTransferFunction { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated struct `taint::OwnedTaintTransferFunction`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:861:24 [INFO] [stdout] | [INFO] [stdout] 861 | let transfer = OwnedTaintTransferFunction { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `node` is never read [INFO] [stdout] --> crates/query/src/executor.rs:32:5 [INFO] [stdout] | [INFO] [stdout] 30 | struct EvaluationContext<'a> { [INFO] [stdout] | ----------------- field in this struct [INFO] [stdout] 31 | /// The current AST node being evaluated [INFO] [stdout] 32 | node: &'a AstNode, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `as_bool` is never used [INFO] [stdout] --> crates/query/src/executor.rs:84:8 [INFO] [stdout] | [INFO] [stdout] 74 | impl Value { [INFO] [stdout] | ---------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 84 | fn as_bool(&self) -> bool { [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: associated function `evaluate_function_call` is never used [INFO] [stdout] --> crates/query/src/executor.rs:516:8 [INFO] [stdout] | [INFO] [stdout] 96 | impl QueryExecutor { [INFO] [stdout] | ------------------ associated function in this implementation [INFO] [stdout] ... [INFO] [stdout] 516 | fn evaluate_function_call(variable: &str, function: &str, ctx: &EvaluationContext) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:374:24 [INFO] [stdout] | [INFO] [stdout] 374 | for source in &self.sources { [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:387:9 [INFO] [stdout] | [INFO] [stdout] 387 | self.sanitizers.iter().any(|san| name_lower.contains(&san.to_lowercase())) [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:652:13 [INFO] [stdout] | [INFO] [stdout] 652 | sources, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:653:13 [INFO] [stdout] | [INFO] [stdout] 653 | sanitizers: HashSet::new(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:672:13 [INFO] [stdout] | [INFO] [stdout] 672 | sources: Vec::new(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:673:13 [INFO] [stdout] | [INFO] [stdout] 673 | sanitizers, [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:720:13 [INFO] [stdout] | [INFO] [stdout] 720 | sources, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:721:13 [INFO] [stdout] | [INFO] [stdout] 721 | sanitizers: HashSet::new(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:760:13 [INFO] [stdout] | [INFO] [stdout] 760 | sources: Vec::new(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:761:13 [INFO] [stdout] | [INFO] [stdout] 761 | sanitizers, [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:827:13 [INFO] [stdout] | [INFO] [stdout] 827 | sources: Vec::new(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:828:13 [INFO] [stdout] | [INFO] [stdout] 828 | sanitizers: HashSet::new(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sources`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:862:13 [INFO] [stdout] | [INFO] [stdout] 862 | sources: Vec::new(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated field `taint::OwnedTaintTransferFunction::sanitizers`: Use AstBasedTaintTransferFunction from taint_ast_based module instead. This legacy implementation has known issues with complex expressions. [INFO] [stdout] --> crates/analyzer/src/taint.rs:863:13 [INFO] [stdout] | [INFO] [stdout] 863 | sanitizers: HashSet::new(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking gittera-cache v0.1.0 (/opt/rustwide/workdir/crates/cache) [INFO] [stderr] Checking gittera-reporter v0.1.0 (/opt/rustwide/workdir/crates/reporter) [INFO] [stdout] warning: field `node` is never read [INFO] [stdout] --> crates/query/src/executor.rs:32:5 [INFO] [stdout] | [INFO] [stdout] 30 | struct EvaluationContext<'a> { [INFO] [stdout] | ----------------- field in this struct [INFO] [stdout] 31 | /// The current AST node being evaluated [INFO] [stdout] 32 | node: &'a AstNode, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `as_bool` is never used [INFO] [stdout] --> crates/query/src/executor.rs:84:8 [INFO] [stdout] | [INFO] [stdout] 74 | impl Value { [INFO] [stdout] | ---------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 84 | fn as_bool(&self) -> bool { [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: associated function `evaluate_function_call` is never used [INFO] [stdout] --> crates/query/src/executor.rs:516:8 [INFO] [stdout] | [INFO] [stdout] 96 | impl QueryExecutor { [INFO] [stdout] | ------------------ associated function in this implementation [INFO] [stdout] ... [INFO] [stdout] 516 | fn evaluate_function_call(variable: &str, function: &str, ctx: &EvaluationContext) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> crates/analyzer/src/taint.rs:517:37 [INFO] [stdout] | [INFO] [stdout] 517 | ... let mut new_taint = TaintValue { [INFO] [stdout] | ----^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `ast` [INFO] [stdout] --> crates/analyzer/src/taint.rs:445:48 [INFO] [stdout] | [INFO] [stdout] 445 | fn transfer(&self, cfg: &ControlFlowGraph, ast: &AstNode, node_idx: CfgGraphIndex, input: &HashSet) -> HashSet crates/analyzer/src/symbol_table.rs:534:13 [INFO] [stdout] | [INFO] [stdout] 534 | let program = AstNode::new( [INFO] [stdout] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_program` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Parser` [INFO] [stdout] --> tests/test_arena_parser.rs:8:41 [INFO] [stdout] | [INFO] [stdout] 8 | AstArena, Language, LanguageConfig, Parser, ParserArena, [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `q` [INFO] [stdout] --> tests/test_parser.rs:23:12 [INFO] [stdout] | [INFO] [stdout] 23 | Ok(q) => println!("Simple query works!"), [INFO] [stdout] | ^ help: if this is intentional, prefix it with an underscore: `_q` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `ast` [INFO] [stdout] --> crates/parser/src/parser_arena.rs:535:13 [INFO] [stdout] | [INFO] [stdout] 535 | let ast = parser.parse_source(&arena, source).unwrap(); [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_ast` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `failed` is never read [INFO] [stdout] --> tests/integration_tests.rs:53:17 [INFO] [stdout] | [INFO] [stdout] 53 | failed += 1; [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: `#[warn(unused_assignments)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `failed` is never read [INFO] [stdout] --> tests/integration_tests.rs:108:17 [INFO] [stdout] | [INFO] [stdout] 108 | failed += 1; [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `node_count` is never read [INFO] [stdout] --> tests/integration_tests.rs:337:26 [INFO] [stdout] | [INFO] [stdout] 337 | let mut node_count = 0; [INFO] [stdout] | ^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> crates/analyzer/src/interprocedural_taint.rs:556:13 [INFO] [stdout] | [INFO] [stdout] 556 | let mut analysis = InterproceduralTaintAnalysis::new() [INFO] [stdout] | ----^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> crates/analyzer/src/interprocedural_taint.rs:566:13 [INFO] [stdout] | [INFO] [stdout] 566 | let mut analysis = InterproceduralTaintAnalysis::new() [INFO] [stdout] | ----^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> crates/analyzer/src/interprocedural_taint.rs:576:13 [INFO] [stdout] | [INFO] [stdout] 576 | let mut analysis = InterproceduralTaintAnalysis::new() [INFO] [stdout] | ----^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `include_patterns` is never read [INFO] [stdout] --> src/discovery.rs:28:9 [INFO] [stdout] | [INFO] [stdout] 20 | pub struct DiscoveryConfig { [INFO] [stdout] | --------------- field in this struct [INFO] [stdout] ... [INFO] [stdout] 28 | pub include_patterns: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `DiscoveryConfig` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `file_path` and `error` are never read [INFO] [stdout] --> src/parallel.rs:21:9 [INFO] [stdout] | [INFO] [stdout] 20 | pub struct FileAnalysisResult { [INFO] [stdout] | ------------------ fields in this struct [INFO] [stdout] 21 | pub file_path: PathBuf, [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 24 | pub error: Option, [INFO] [stdout] | ^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `FileAnalysisResult` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `failed_files` is never read [INFO] [stdout] --> src/parallel.rs:213:9 [INFO] [stdout] | [INFO] [stdout] 210 | pub struct AnalysisStatistics { [INFO] [stdout] | ------------------ field in this struct [INFO] [stdout] ... [INFO] [stdout] 213 | pub failed_files: usize, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `AnalysisStatistics` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `DummyTransfer` is never constructed [INFO] [stdout] --> crates/analyzer/src/dataflow.rs:222:12 [INFO] [stdout] | [INFO] [stdout] 222 | struct DummyTransfer; [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: associated function `build_ast_map` is never used [INFO] [stdout] --> crates/analyzer/src/taint_ast_based.rs:27:8 [INFO] [stdout] | [INFO] [stdout] 18 | impl AstBasedTaintTransferFunction { [INFO] [stdout] | ---------------------------------- associated function in this implementation [INFO] [stdout] ... [INFO] [stdout] 27 | fn build_ast_map<'a>(node: &'a AstNode, map: &mut HashMap) { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `max_loop_iterations` is never read [INFO] [stdout] --> crates/analyzer/src/symbolic.rs:456:5 [INFO] [stdout] | [INFO] [stdout] 453 | pub struct SymbolicExecutor { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] ... [INFO] [stdout] 456 | max_loop_iterations: usize, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `Skip` is never constructed [INFO] [stdout] --> crates/analyzer/src/symbolic.rs:707:5 [INFO] [stdout] | [INFO] [stdout] 696 | enum ExecutionAction { [INFO] [stdout] | --------------- variant in this enum [INFO] [stdout] ... [INFO] [stdout] 707 | Skip, [INFO] [stdout] | ^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `include_patterns` is never read [INFO] [stdout] --> src/discovery.rs:28:9 [INFO] [stdout] | [INFO] [stdout] 20 | pub struct DiscoveryConfig { [INFO] [stdout] | --------------- field in this struct [INFO] [stdout] ... [INFO] [stdout] 28 | pub include_patterns: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `DiscoveryConfig` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `file_path` and `error` are never read [INFO] [stdout] --> src/parallel.rs:21:9 [INFO] [stdout] | [INFO] [stdout] 20 | pub struct FileAnalysisResult { [INFO] [stdout] | ------------------ fields in this struct [INFO] [stdout] 21 | pub file_path: PathBuf, [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 24 | pub error: Option, [INFO] [stdout] | ^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `FileAnalysisResult` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `failed_files` is never read [INFO] [stdout] --> src/parallel.rs:213:9 [INFO] [stdout] | [INFO] [stdout] 210 | pub struct AnalysisStatistics { [INFO] [stdout] | ------------------ field in this struct [INFO] [stdout] ... [INFO] [stdout] 213 | pub failed_files: usize, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `AnalysisStatistics` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 57.54s [INFO] running `Command { std: "docker" "inspect" "cae3809d5beef4a6878c5c434a21f0a78fc10147a1d5db9713988adb25134566", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "cae3809d5beef4a6878c5c434a21f0a78fc10147a1d5db9713988adb25134566", kill_on_drop: false }` [INFO] [stdout] cae3809d5beef4a6878c5c434a21f0a78fc10147a1d5db9713988adb25134566