[INFO] fetching crate nullsec-discord-shield 1.1.0... [INFO] testing nullsec-discord-shield-1.1.0 against try#dec9417b8611e34e787a3e4c37686b5131f9e5c5 for pr-154210-1 [INFO] extracting crate nullsec-discord-shield 1.1.0 into /workspace/builds/worker-4-tc2/source [INFO] started tweaking crates.io crate nullsec-discord-shield 1.1.0 [INFO] finished tweaking crates.io crate nullsec-discord-shield 1.1.0 [INFO] tweaked toml for crates.io crate nullsec-discord-shield 1.1.0 written to /workspace/builds/worker-4-tc2/source/Cargo.toml [INFO] validating manifest of crates.io crate nullsec-discord-shield 1.1.0 on toolchain dec9417b8611e34e787a3e4c37686b5131f9e5c5 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+dec9417b8611e34e787a3e4c37686b5131f9e5c5" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate crates.io crate nullsec-discord-shield 1.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+dec9417b8611e34e787a3e4c37686b5131f9e5c5" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+dec9417b8611e34e787a3e4c37686b5131f9e5c5" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] a677216c158437b6cccb528ae7dd2d542bebfd5eed6f551f3fccc3b544dae9c8 [INFO] running `Command { std: "docker" "start" "-a" "a677216c158437b6cccb528ae7dd2d542bebfd5eed6f551f3fccc3b544dae9c8", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "a677216c158437b6cccb528ae7dd2d542bebfd5eed6f551f3fccc3b544dae9c8", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "a677216c158437b6cccb528ae7dd2d542bebfd5eed6f551f3fccc3b544dae9c8", kill_on_drop: false }` [INFO] [stdout] a677216c158437b6cccb528ae7dd2d542bebfd5eed6f551f3fccc3b544dae9c8 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+dec9417b8611e34e787a3e4c37686b5131f9e5c5" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 7a645526df643a48868c5961bb89a39638b46c92b337d2a072fd4c852ef156ee [INFO] running `Command { std: "docker" "start" "-a" "7a645526df643a48868c5961bb89a39638b46c92b337d2a072fd4c852ef156ee", kill_on_drop: false }` [INFO] [stderr] Compiling libc v0.2.180 [INFO] [stderr] Compiling quote v1.0.44 [INFO] [stderr] Compiling unicode-ident v1.0.22 [INFO] [stderr] Compiling zerocopy v0.8.38 [INFO] [stderr] Compiling crossbeam-utils v0.8.21 [INFO] [stderr] Compiling zmij v1.0.19 [INFO] [stderr] Compiling aho-corasick v1.1.4 [INFO] [stderr] Compiling regex-syntax v0.8.9 [INFO] [stderr] Compiling inout v0.1.4 [INFO] [stderr] Compiling termcolor v1.4.1 [INFO] [stderr] Compiling match_cfg v0.1.0 [INFO] [stderr] Compiling humantime v2.3.0 [INFO] [stderr] Compiling bitflags v2.10.0 [INFO] [stderr] Compiling chrono v0.4.43 [INFO] [stderr] Compiling proc-macro2 v1.0.106 [INFO] [stderr] Compiling crossbeam-channel v0.5.15 [INFO] [stderr] Compiling syn v2.0.114 [INFO] [stderr] Compiling serde_json v1.0.149 [INFO] [stderr] Compiling getrandom v0.2.17 [INFO] [stderr] Compiling errno v0.3.14 [INFO] [stderr] Compiling inotify-sys v0.1.5 [INFO] [stderr] Compiling parking_lot_core v0.9.12 [INFO] [stderr] Compiling dirs-sys v0.4.1 [INFO] [stderr] Compiling filetime v0.2.27 [INFO] [stderr] Compiling mio v1.1.1 [INFO] [stderr] Compiling socket2 v0.6.2 [INFO] [stderr] Compiling is-terminal v0.4.17 [INFO] [stderr] Compiling mio v0.8.11 [INFO] [stderr] Compiling hostname v0.3.1 [INFO] [stderr] Compiling nix v0.27.1 [INFO] [stderr] Compiling inotify v0.9.6 [INFO] [stderr] Compiling signal-hook-registry v1.4.8 [INFO] [stderr] Compiling rand_core v0.6.4 [INFO] [stderr] Compiling regex-automata v0.4.14 [INFO] [stderr] Compiling dirs v5.0.1 [INFO] [stderr] Compiling notify v6.1.1 [INFO] [stderr] Compiling crypto-common v0.1.7 [INFO] [stderr] Compiling cipher v0.4.4 [INFO] [stderr] Compiling universal-hash v0.5.1 [INFO] [stderr] Compiling aead v0.5.2 [INFO] [stderr] Compiling digest v0.10.7 [INFO] [stderr] Compiling polyval v0.6.2 [INFO] [stderr] Compiling parking_lot v0.12.5 [INFO] [stderr] Compiling sha2 v0.10.9 [INFO] [stderr] Compiling ghash v0.5.1 [INFO] [stderr] Compiling aes v0.8.4 [INFO] [stderr] Compiling ctr v0.9.2 [INFO] [stderr] Compiling aes-gcm v0.10.3 [INFO] [stderr] Compiling tokio-macros v2.6.0 [INFO] [stderr] Compiling serde_derive v1.0.228 [INFO] [stderr] Compiling ppv-lite86 v0.2.21 [INFO] [stderr] Compiling rand_chacha v0.3.1 [INFO] [stderr] Compiling rand v0.8.5 [INFO] [stderr] Compiling regex v1.12.3 [INFO] [stderr] Compiling tokio v1.49.0 [INFO] [stderr] Compiling env_logger v0.10.2 [INFO] [stderr] Compiling serde v1.0.228 [INFO] [stderr] Compiling nullsec-discord-shield v1.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused import: `std::path::Path` [INFO] [stdout] --> src/hooks/linux_hooks.rs:5:5 [INFO] [stdout] | [INFO] [stdout] 5 | use std::path::Path; [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `warn` [INFO] [stdout] --> src/protection/memory_guard.rs:2:17 [INFO] [stdout] | [INFO] [stdout] 2 | use log::{info, warn}; [INFO] [stdout] | ^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `std::process::Command` [INFO] [stdout] --> src/protection/memory_guard.rs:58:13 [INFO] [stdout] | [INFO] [stdout] 58 | use std::process::Command; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary parentheses around `if` condition [INFO] [stdout] --> src/protection/process_monitor.rs:133:12 [INFO] [stdout] | [INFO] [stdout] 133 | if (name_lower.contains("python") || name_lower.contains("node")) { [INFO] [stdout] | ^ ^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_parens)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] help: remove these parentheses [INFO] [stdout] | [INFO] [stdout] 133 - if (name_lower.contains("python") || name_lower.contains("node")) { [INFO] [stdout] 133 + if name_lower.contains("python") || name_lower.contains("node") { [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `warn` [INFO] [stdout] --> src/main.rs:16:17 [INFO] [stdout] | [INFO] [stdout] 16 | use log::{info, warn, error, LevelFilter}; [INFO] [stdout] | ^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `tokens` [INFO] [stdout] --> src/protection/token_vault.rs:135:42 [INFO] [stdout] | [INFO] [stdout] 135 | fn protect_original_locations(&self, tokens: &[String]) -> Result<(), Box> { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_tokens` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `scanner_processes` [INFO] [stdout] --> src/protection/memory_guard.rs:127:13 [INFO] [stdout] | [INFO] [stdout] 127 | let scanner_processes = [ [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_scanner_processes` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `artifact_patterns` [INFO] [stdout] --> src/main.rs:174:13 [INFO] [stdout] | [INFO] [stdout] 174 | let artifact_patterns = [ [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_artifact_patterns` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `config` is never read [INFO] [stdout] --> src/main.rs:78:5 [INFO] [stdout] | [INFO] [stdout] 77 | pub struct DiscordShield { [INFO] [stdout] | ------------- field in this struct [INFO] [stdout] 78 | config: ShieldConfig, [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `disable_debug_privileges` is never used [INFO] [stdout] --> src/main.rs:149:8 [INFO] [stdout] | [INFO] [stdout] 86 | impl DiscordShield { [INFO] [stdout] | ------------------ method in this implementation [INFO] [stdout] ... [INFO] [stdout] 149 | fn disable_debug_privileges(&self) -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `decrypt` is never used [INFO] [stdout] --> src/core/crypto.rs:50:12 [INFO] [stdout] | [INFO] [stdout] 15 | impl TokenCrypto { [INFO] [stdout] | ---------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 50 | pub fn decrypt(&self, data: &[u8]) -> Result, Box> { [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `deobfuscate_token` is never used [INFO] [stdout] --> src/core/crypto.rs:79:8 [INFO] [stdout] | [INFO] [stdout] 79 | pub fn deobfuscate_token(data: &[u8]) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `find_webhooks_in_text` is never used [INFO] [stdout] --> src/core/utils.rs:21:8 [INFO] [stdout] | [INFO] [stdout] 21 | pub fn find_webhooks_in_text(text: &str) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `is_suspicious_process_name` is never used [INFO] [stdout] --> src/core/utils.rs:63:8 [INFO] [stdout] | [INFO] [stdout] 63 | pub fn is_suspicious_process_name(name: &str) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `check_ptrace` is never used [INFO] [stdout] --> src/hooks/linux_hooks.rs:9:8 [INFO] [stdout] | [INFO] [stdout] 9 | pub fn check_ptrace() -> bool { [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `check_ld_preload` is never used [INFO] [stdout] --> src/hooks/linux_hooks.rs:30:8 [INFO] [stdout] | [INFO] [stdout] 30 | pub fn check_ld_preload() -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `check_suspicious_processes` is never used [INFO] [stdout] --> src/hooks/linux_hooks.rs:41:8 [INFO] [stdout] | [INFO] [stdout] 41 | pub fn check_suspicious_processes() -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `check_fd_access` is never used [INFO] [stdout] --> src/hooks/linux_hooks.rs:71:8 [INFO] [stdout] | [INFO] [stdout] 71 | pub fn check_fd_access(discord_paths: &[&str]) -> Vec<(u32, String)> { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `check_seccomp_status` is never used [INFO] [stdout] --> src/hooks/linux_hooks.rs:105:8 [INFO] [stdout] | [INFO] [stdout] 105 | pub fn check_seccomp_status() -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `setup_protection` is never used [INFO] [stdout] --> src/hooks/linux_hooks.rs:117:8 [INFO] [stdout] | [INFO] [stdout] 117 | pub fn setup_protection() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `config` is never read [INFO] [stdout] --> src/protection/token_vault.rs:11:5 [INFO] [stdout] | [INFO] [stdout] 10 | pub struct TokenVault { [INFO] [stdout] | ---------- field in this struct [INFO] [stdout] 11 | config: ShieldConfig, [INFO] [stdout] | ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `load_vault` is never used [INFO] [stdout] --> src/protection/token_vault.rs:142:12 [INFO] [stdout] | [INFO] [stdout] 17 | impl TokenVault { [INFO] [stdout] | --------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 142 | pub fn load_vault(&mut self) -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `scan_for_memory_threats`, `is_debugger_present`, and `detect_memory_scanners` are never used [INFO] [stdout] --> src/protection/memory_guard.rs:78:12 [INFO] [stdout] | [INFO] [stdout] 12 | impl MemoryGuard { [INFO] [stdout] | ---------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 78 | pub fn scan_for_memory_threats(&self) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 94 | fn is_debugger_present(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 125 | fn detect_memory_scanners(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: enum `MemoryThreat` is never used [INFO] [stdout] --> src/protection/memory_guard.rs:143:10 [INFO] [stdout] | [INFO] [stdout] 143 | pub enum MemoryThreat { [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 22.34s [INFO] running `Command { std: "docker" "inspect" "7a645526df643a48868c5961bb89a39638b46c92b337d2a072fd4c852ef156ee", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "7a645526df643a48868c5961bb89a39638b46c92b337d2a072fd4c852ef156ee", kill_on_drop: false }` [INFO] [stdout] 7a645526df643a48868c5961bb89a39638b46c92b337d2a072fd4c852ef156ee [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+dec9417b8611e34e787a3e4c37686b5131f9e5c5" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 3a6709c32f8150dc79a1e74a1ac4bc714f1b8d501a2f0fad332a1f919b0f36c2 [INFO] running `Command { std: "docker" "start" "-a" "3a6709c32f8150dc79a1e74a1ac4bc714f1b8d501a2f0fad332a1f919b0f36c2", kill_on_drop: false }` [INFO] [stderr] Compiling nullsec-discord-shield v1.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused import: `std::path::Path` [INFO] [stdout] --> src/hooks/linux_hooks.rs:5:5 [INFO] [stdout] | [INFO] [stdout] 5 | use std::path::Path; [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `warn` [INFO] [stdout] --> src/protection/memory_guard.rs:2:17 [INFO] [stdout] | [INFO] [stdout] 2 | use log::{info, warn}; [INFO] [stdout] | ^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `std::process::Command` [INFO] [stdout] --> src/protection/memory_guard.rs:58:13 [INFO] [stdout] | [INFO] [stdout] 58 | use std::process::Command; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary parentheses around `if` condition [INFO] [stdout] --> src/protection/process_monitor.rs:133:12 [INFO] [stdout] | [INFO] [stdout] 133 | if (name_lower.contains("python") || name_lower.contains("node")) { [INFO] [stdout] | ^ ^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_parens)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] help: remove these parentheses [INFO] [stdout] | [INFO] [stdout] 133 - if (name_lower.contains("python") || name_lower.contains("node")) { [INFO] [stdout] 133 + if name_lower.contains("python") || name_lower.contains("node") { [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `warn` [INFO] [stdout] --> src/main.rs:16:17 [INFO] [stdout] | [INFO] [stdout] 16 | use log::{info, warn, error, LevelFilter}; [INFO] [stdout] | ^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `tokens` [INFO] [stdout] --> src/protection/token_vault.rs:135:42 [INFO] [stdout] | [INFO] [stdout] 135 | fn protect_original_locations(&self, tokens: &[String]) -> Result<(), Box> { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_tokens` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `scanner_processes` [INFO] [stdout] --> src/protection/memory_guard.rs:127:13 [INFO] [stdout] | [INFO] [stdout] 127 | let scanner_processes = [ [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_scanner_processes` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `artifact_patterns` [INFO] [stdout] --> src/main.rs:174:13 [INFO] [stdout] | [INFO] [stdout] 174 | let artifact_patterns = [ [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_artifact_patterns` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `config` is never read [INFO] [stdout] --> src/main.rs:78:5 [INFO] [stdout] | [INFO] [stdout] 77 | pub struct DiscordShield { [INFO] [stdout] | ------------- field in this struct [INFO] [stdout] 78 | config: ShieldConfig, [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `disable_debug_privileges` is never used [INFO] [stdout] --> src/main.rs:149:8 [INFO] [stdout] | [INFO] [stdout] 86 | impl DiscordShield { [INFO] [stdout] | ------------------ method in this implementation [INFO] [stdout] ... [INFO] [stdout] 149 | fn disable_debug_privileges(&self) -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `decrypt` is never used [INFO] [stdout] --> src/core/crypto.rs:50:12 [INFO] [stdout] | [INFO] [stdout] 15 | impl TokenCrypto { [INFO] [stdout] | ---------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 50 | pub fn decrypt(&self, data: &[u8]) -> Result, Box> { [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `deobfuscate_token` is never used [INFO] [stdout] --> src/core/crypto.rs:79:8 [INFO] [stdout] | [INFO] [stdout] 79 | pub fn deobfuscate_token(data: &[u8]) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `find_webhooks_in_text` is never used [INFO] [stdout] --> src/core/utils.rs:21:8 [INFO] [stdout] | [INFO] [stdout] 21 | pub fn find_webhooks_in_text(text: &str) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `is_suspicious_process_name` is never used [INFO] [stdout] --> src/core/utils.rs:63:8 [INFO] [stdout] | [INFO] [stdout] 63 | pub fn is_suspicious_process_name(name: &str) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `check_suspicious_processes` is never used [INFO] [stdout] --> src/hooks/linux_hooks.rs:41:8 [INFO] [stdout] | [INFO] [stdout] 41 | pub fn check_suspicious_processes() -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `check_fd_access` is never used [INFO] [stdout] --> src/hooks/linux_hooks.rs:71:8 [INFO] [stdout] | [INFO] [stdout] 71 | pub fn check_fd_access(discord_paths: &[&str]) -> Vec<(u32, String)> { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `check_seccomp_status` is never used [INFO] [stdout] --> src/hooks/linux_hooks.rs:105:8 [INFO] [stdout] | [INFO] [stdout] 105 | pub fn check_seccomp_status() -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `setup_protection` is never used [INFO] [stdout] --> src/hooks/linux_hooks.rs:117:8 [INFO] [stdout] | [INFO] [stdout] 117 | pub fn setup_protection() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `config` is never read [INFO] [stdout] --> src/protection/token_vault.rs:11:5 [INFO] [stdout] | [INFO] [stdout] 10 | pub struct TokenVault { [INFO] [stdout] | ---------- field in this struct [INFO] [stdout] 11 | config: ShieldConfig, [INFO] [stdout] | ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `load_vault` is never used [INFO] [stdout] --> src/protection/token_vault.rs:142:12 [INFO] [stdout] | [INFO] [stdout] 17 | impl TokenVault { [INFO] [stdout] | --------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 142 | pub fn load_vault(&mut self) -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `scan_for_memory_threats`, `is_debugger_present`, and `detect_memory_scanners` are never used [INFO] [stdout] --> src/protection/memory_guard.rs:78:12 [INFO] [stdout] | [INFO] [stdout] 12 | impl MemoryGuard { [INFO] [stdout] | ---------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 78 | pub fn scan_for_memory_threats(&self) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 94 | fn is_debugger_present(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 125 | fn detect_memory_scanners(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: enum `MemoryThreat` is never used [INFO] [stdout] --> src/protection/memory_guard.rs:143:10 [INFO] [stdout] | [INFO] [stdout] 143 | pub enum MemoryThreat { [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 1.02s [INFO] running `Command { std: "docker" "inspect" "3a6709c32f8150dc79a1e74a1ac4bc714f1b8d501a2f0fad332a1f919b0f36c2", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "3a6709c32f8150dc79a1e74a1ac4bc714f1b8d501a2f0fad332a1f919b0f36c2", kill_on_drop: false }` [INFO] [stdout] 3a6709c32f8150dc79a1e74a1ac4bc714f1b8d501a2f0fad332a1f919b0f36c2 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+dec9417b8611e34e787a3e4c37686b5131f9e5c5" "test" "--frozen", kill_on_drop: false }` [INFO] [stdout] 9120aaa71ed221977396fed6bbef4dd30acd1a1f9fe762120ae47feff5811e3c [INFO] running `Command { std: "docker" "start" "-a" "9120aaa71ed221977396fed6bbef4dd30acd1a1f9fe762120ae47feff5811e3c", kill_on_drop: false }` [INFO] [stderr] warning: unused import: `std::path::Path` [INFO] [stderr] --> src/hooks/linux_hooks.rs:5:5 [INFO] [stderr] | [INFO] [stderr] 5 | use std::path::Path; [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default [INFO] [stderr] [INFO] [stderr] warning: unused import: `warn` [INFO] [stderr] --> src/protection/memory_guard.rs:2:17 [INFO] [stderr] | [INFO] [stderr] 2 | use log::{info, warn}; [INFO] [stderr] | ^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `std::process::Command` [INFO] [stderr] --> src/protection/memory_guard.rs:58:13 [INFO] [stderr] | [INFO] [stderr] 58 | use std::process::Command; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unnecessary parentheses around `if` condition [INFO] [stderr] --> src/protection/process_monitor.rs:133:12 [INFO] [stderr] | [INFO] [stderr] 133 | if (name_lower.contains("python") || name_lower.contains("node")) { [INFO] [stderr] | ^ ^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_parens)]` (part of `#[warn(unused)]`) on by default [INFO] [stderr] help: remove these parentheses [INFO] [stderr] | [INFO] [stderr] 133 - if (name_lower.contains("python") || name_lower.contains("node")) { [INFO] [stderr] 133 + if name_lower.contains("python") || name_lower.contains("node") { [INFO] [stderr] | [INFO] [stderr] [INFO] [stderr] warning: unused import: `warn` [INFO] [stderr] --> src/main.rs:16:17 [INFO] [stderr] | [INFO] [stderr] 16 | use log::{info, warn, error, LevelFilter}; [INFO] [stderr] | ^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused variable: `tokens` [INFO] [stderr] --> src/protection/token_vault.rs:135:42 [INFO] [stderr] | [INFO] [stderr] 135 | fn protect_original_locations(&self, tokens: &[String]) -> Result<(), Box> { [INFO] [stderr] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_tokens` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `scanner_processes` [INFO] [stderr] --> src/protection/memory_guard.rs:127:13 [INFO] [stderr] | [INFO] [stderr] 127 | let scanner_processes = [ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_scanner_processes` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `artifact_patterns` [INFO] [stderr] --> src/main.rs:174:13 [INFO] [stderr] | [INFO] [stderr] 174 | let artifact_patterns = [ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_artifact_patterns` [INFO] [stderr] [INFO] [stderr] warning: field `config` is never read [INFO] [stderr] --> src/main.rs:78:5 [INFO] [stderr] | [INFO] [stderr] 77 | pub struct DiscordShield { [INFO] [stderr] | ------------- field in this struct [INFO] [stderr] 78 | config: ShieldConfig, [INFO] [stderr] | ^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stderr] [INFO] [stderr] warning: method `disable_debug_privileges` is never used [INFO] [stderr] --> src/main.rs:149:8 [INFO] [stderr] | [INFO] [stderr] 86 | impl DiscordShield { [INFO] [stderr] | ------------------ method in this implementation [INFO] [stderr] ... [INFO] [stderr] 149 | fn disable_debug_privileges(&self) -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: method `decrypt` is never used [INFO] [stderr] --> src/core/crypto.rs:50:12 [INFO] [stderr] | [INFO] [stderr] 15 | impl TokenCrypto { [INFO] [stderr] | ---------------- method in this implementation [INFO] [stderr] ... [INFO] [stderr] 50 | pub fn decrypt(&self, data: &[u8]) -> Result, Box> { [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: function `deobfuscate_token` is never used [INFO] [stderr] --> src/core/crypto.rs:79:8 [INFO] [stderr] | [INFO] [stderr] 79 | pub fn deobfuscate_token(data: &[u8]) -> Option { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: function `find_webhooks_in_text` is never used [INFO] [stderr] --> src/core/utils.rs:21:8 [INFO] [stderr] | [INFO] [stderr] 21 | pub fn find_webhooks_in_text(text: &str) -> Vec { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: function `is_suspicious_process_name` is never used [INFO] [stderr] --> src/core/utils.rs:63:8 [INFO] [stderr] | [INFO] [stderr] 63 | pub fn is_suspicious_process_name(name: &str) -> bool { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: function `check_suspicious_processes` is never used [INFO] [stderr] --> src/hooks/linux_hooks.rs:41:8 [INFO] [stderr] | [INFO] [stderr] 41 | pub fn check_suspicious_processes() -> Vec { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: function `check_fd_access` is never used [INFO] [stderr] --> src/hooks/linux_hooks.rs:71:8 [INFO] [stderr] | [INFO] [stderr] 71 | pub fn check_fd_access(discord_paths: &[&str]) -> Vec<(u32, String)> { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: function `check_seccomp_status` is never used [INFO] [stderr] --> src/hooks/linux_hooks.rs:105:8 [INFO] [stderr] | [INFO] [stderr] 105 | pub fn check_seccomp_status() -> Option { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: function `setup_protection` is never used [INFO] [stderr] --> src/hooks/linux_hooks.rs:117:8 [INFO] [stderr] | [INFO] [stderr] 117 | pub fn setup_protection() { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: field `config` is never read [INFO] [stderr] --> src/protection/token_vault.rs:11:5 [INFO] [stderr] | [INFO] [stderr] 10 | pub struct TokenVault { [INFO] [stderr] | ---------- field in this struct [INFO] [stderr] 11 | config: ShieldConfig, [INFO] [stderr] | ^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: method `load_vault` is never used [INFO] [stderr] --> src/protection/token_vault.rs:142:12 [INFO] [stderr] | [INFO] [stderr] 17 | impl TokenVault { [INFO] [stderr] | --------------- method in this implementation [INFO] [stderr] ... [INFO] [stderr] 142 | pub fn load_vault(&mut self) -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: methods `scan_for_memory_threats`, `is_debugger_present`, and `detect_memory_scanners` are never used [INFO] [stderr] --> src/protection/memory_guard.rs:78:12 [INFO] [stderr] | [INFO] [stderr] 12 | impl MemoryGuard { [INFO] [stderr] | ---------------- methods in this implementation [INFO] [stderr] ... [INFO] [stderr] 78 | pub fn scan_for_memory_threats(&self) -> Vec { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] ... [INFO] [stderr] 94 | fn is_debugger_present(&self) -> bool { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] ... [INFO] [stderr] 125 | fn detect_memory_scanners(&self) -> bool { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: enum `MemoryThreat` is never used [INFO] [stderr] --> src/protection/memory_guard.rs:143:10 [INFO] [stderr] | [INFO] [stderr] 143 | pub enum MemoryThreat { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: `nullsec-discord-shield` (bin "discord-shield" test) generated 22 warnings (run `cargo fix --bin "discord-shield" -p nullsec-discord-shield --tests` to apply 8 suggestions) [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 0.19s [INFO] [stderr] Running unittests src/main.rs (/opt/rustwide/target/debug/deps/discord_shield-4431188050a083a0) [INFO] [stdout] [INFO] [stdout] running 2 tests [INFO] [stdout] test hooks::linux_hooks::tests::test_ptrace_check ... ok [INFO] [stdout] test hooks::linux_hooks::tests::test_ld_preload_check ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 2 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.04s [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "9120aaa71ed221977396fed6bbef4dd30acd1a1f9fe762120ae47feff5811e3c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "9120aaa71ed221977396fed6bbef4dd30acd1a1f9fe762120ae47feff5811e3c", kill_on_drop: false }` [INFO] [stdout] 9120aaa71ed221977396fed6bbef4dd30acd1a1f9fe762120ae47feff5811e3c