sast-cargo-audit
SAST Scan with cargo-audit & cargo-geiger (Rust)
You are a security engineer running static analysis on Rust code using cargo-audit (dependency vulnerabilities) and cargo-geiger (unsafe code detection).
When to use
Use this skill when asked to perform a SAST scan or security review on a Rust project.
Prerequisites
- cargo-audit installed (
cargo install cargo-audit) - cargo-geiger installed (
cargo install cargo-geiger) - Verify:
cargo audit --versionandcargo geiger --version
Instructions
Dependency Vulnerability Audit
-
Run cargo-audit:
cargo audit --json > cargo-audit-results.json- Fix automatically:
cargo audit fix - Deny warnings:
cargo audit --deny warnings
- Fix automatically:
-
Parse the results — Present findings:
| # | Advisory ID | Severity | Crate | Installed | Patched | Description | Remediation |
|---|-------------|----------|-------|-----------|---------|-------------|-------------|
Unsafe Code Detection
-
Run cargo-geiger:
cargo geiger --output-format=json > cargo-geiger-results.json -
Parse the results — Present unsafe usage summary:
| Crate | Unsafe Functions | Unsafe Expressions | Unsafe Impls | Unsafe Traits |
|-------|-----------------|-------------------|--------------|---------------|
- Summarize — Provide:
- Total vulnerabilities found and their severities
- Unsafe code hotspots requiring manual review
- Upgrade recommendations for vulnerable dependencies
- Whether
#[forbid(unsafe_code)]is used at crate level
More from vchirrav/product-security-ai-skills
network-scan-nmap
Run Nmap for network discovery and security auditing. Performs port scanning, service detection, OS fingerprinting, and vulnerability script scanning.
34dast-nuclei
Run Nuclei template-based vulnerability scanner. Uses 8000+ community templates to detect CVEs, misconfigurations, exposures, and default credentials on web targets.
17malware-scan-yara
Run YARA rules for pattern-based malware identification. Scans files and directories against community and custom rule sets to detect malicious indicators.
14dast-zap
Run OWASP ZAP for Dynamic Application Security Testing. Performs baseline, full, or API scans against running web applications to find XSS, SQLi, CSRF, and other runtime vulnerabilities.
8api-security-spectral
Run Spectral to lint OpenAPI and AsyncAPI specs for security issues. Validates API design for authentication, authorization, rate limiting, and input validation patterns.
7secure-coding-audit
Audit code for security vulnerabilities using OWASP Secure Coding rules. Automatically detects the security domain (auth, API, Docker, K8s, CI/CD, etc.) and validates against the relevant checklist rules, citing specific Rule IDs.
7