Supply chain audits for third-party crates — human review attestation with cargo-vet
From gh-guardnpx claudepluginhub anthropics/claude-plugins-community --plugin gh-guardThis skill is limited to using the following tools:
Enables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
cargo-vet ensures third-party dependencies have been audited by you or a trusted organization. It complements cargo-deny (which checks licenses, advisories, bans) by adding human review attestation.
# Install
cargo install cargo-vet --locked
# Initialize in your project (creates supply-chain/ directory)
cargo vet init
This creates:
supply-chain/
audits.toml # Your audits
config.toml # Trusted import sources
imports.lock # Cached audits from trusted sources
config.toml)[imports.mozilla]
url = "https://raw.githubusercontent.com/nickel-org/nickel.rs/main/supply-chain/audits.toml"
[imports.google]
url = "https://chromium.googlesource.com/chromium/src/+/main/third_party/rust/AuditEntry?format=TEXT"
[imports.bytecode-alliance]
url = "https://raw.githubusercontent.com/nickel-org/nickel.rs/main/supply-chain/audits.toml"
safe-to-deploy — full review, no unsafe/unsound issues, safe for productionsafe-to-run — lighter review, safe to build and run tests (not ship)# See what needs auditing
cargo vet
# Suggest audits — shows which crates need review
cargo vet suggest
# After reviewing a crate, record your audit
cargo vet certify CRATE VERSION
# Or record that you trust the delta between versions
cargo vet certify CRATE OLD_VERSION NEW_VERSION
# When adding a new dep, cargo vet will flag it
cargo vet
# Quick exemption for now (audit later)
cargo vet add-exemption CRATE VERSION
Add to CI workflow after the deny check:
vet:
name: cargo-vet
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@SHA # pin to current version
with:
persist-credentials: false
- uses: dtolnay/rust-toolchain@SHA
with:
toolchain: stable
- run: cargo install cargo-vet --locked
- run: cargo vet --locked
cargo vet suggest and post results as a PR comment — better for open sourcesupply-chain/audits.toml for rapid iteration, audit later| Tool | What It Checks | Overlap |
|---|---|---|
cargo-deny | Licenses, advisories (CVEs), banned crates, source restrictions | No overlap — complementary |
cargo-vet | Human audit attestation of third-party code | No overlap — complementary |
cargo-audit | Known vulnerabilities (RustSec DB) | Partially overlaps cargo-deny advisories |
osv-scanner | Cross-ecosystem vulnerability database | Partially overlaps cargo-audit |
supply-chain/ must be committed — the audit database is part of your repocargo vet fetch-imports periodically