Skip to content

Update actions-rust-lang/setup-rust-toolchain action to v1.16.1#783

Open
renovate[bot] wants to merge 1 commit into
masterfrom
renovate/actions-rust-lang-setup-rust-toolchain-1.x
Open

Update actions-rust-lang/setup-rust-toolchain action to v1.16.1#783
renovate[bot] wants to merge 1 commit into
masterfrom
renovate/actions-rust-lang-setup-rust-toolchain-1.x

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Mar 27, 2026

This PR contains the following updates:

Package Type Update Change
actions-rust-lang/setup-rust-toolchain action minor v1.15.2v1.16.1

Release Notes

actions-rust-lang/setup-rust-toolchain (actions-rust-lang/setup-rust-toolchain)

v1.16.1

Compare Source

What's Changed
  • Rename local variables to avoid conflicts with global variables by @​jonasbb in #​92

Full Changelog: actions-rust-lang/setup-rust-toolchain@v1.16.0...v1.16.1

v1.16.0

Compare Source

What's Changed

New Contributors

Full Changelog: actions-rust-lang/setup-rust-toolchain@v1.15.4...v1.16.0

v1.16

Compare Source

v1.15.4

Compare Source

What's Changed

New Contributors

Full Changelog: actions-rust-lang/setup-rust-toolchain@v1.15.3...v1.15.4

v1.15.3

Compare Source

What's Changed

New Contributors

Full Changelog: actions-rust-lang/setup-rust-toolchain@v1.15.2...v1.15.3


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot requested a review from a team as a code owner March 27, 2026 01:38
@renovate renovate Bot force-pushed the renovate/actions-rust-lang-setup-rust-toolchain-1.x branch 3 times, most recently from 9672c6b to 9592b45 Compare April 2, 2026 15:16
@renovate renovate Bot force-pushed the renovate/actions-rust-lang-setup-rust-toolchain-1.x branch from 9592b45 to d63126f Compare April 7, 2026 14:17
@socket-security
Copy link
Copy Markdown

socket-security Bot commented Apr 7, 2026

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. It is recommended to resolve "Warn" alerts too. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Block Low
Potential code anomaly (AI signal): npm @humanwhocodes/retry is 100.0% likely to have a medium risk anomaly

Notes: The Retrier class implements a conventional, well-scoped retry mechanism with abort support and backoff-like scheduling. There is no evidence of malicious behavior, data exfiltration, or backdoors in this fragment. The primary security considerations relate to the trustworthiness of the host-provided function (fn) and the external timing constants that govern bail/retry behavior. Overall risk is moderate due to the possibility of executing arbitrary host code, but this is expected for a retry utility; no external communications or data leakage are evident here.

Confidence: 1.00

Severity: 0.60

From: ?npm/eslint@9.33.0npm/@humanwhocodes/retry@0.3.1

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/@humanwhocodes/retry@0.3.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm colord is 100.0% likely to have a medium risk anomaly

Notes: The code constitutes a focused HWB color space utility that converts RGBA to HWB and parses HWB strings, exposing conversion helpers via prototype augmentation. There is no direct evidence of malicious activity (no network/file I/O, no data leakage to unknown sinks). The main security considerations are prototype pollution risks due to prototype augmentation and the potential for side effects in environments that rely on Object.prototype stability; otherwise, the fragment appears benign as a color conversion utility.

Confidence: 1.00

Severity: 0.60

From: ?npm/colord@2.9.3

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/colord@2.9.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm consola is 100.0% likely to have a medium risk anomaly

Notes: The analyzed code fragment is a feature-rich, standard Consola logging utility responsible for redirecting and managing log output with throttling, pausing, and reporter integration. There is no direct evidence of malicious activity, hardcoded secrets, or exfiltration within this snippet. However, the powerful I/O overrides pose privacy and data flow risks if reporters or downstream sinks are untrusted. The security posture hinges on trusted reporters and proper governance of the overall supply chain.

Confidence: 1.00

Severity: 0.60

From: ?npm/ava@6.4.1npm/consola@3.4.2

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/consola@3.4.2. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm css-select is 100.0% likely to have a medium risk anomaly

Notes: The analyzed code appears to be a legitimate and well-structured component of a CSS selector engine (css-select) implementing pseudo-selectors such as :is, :not, :has, :matches, and :where. There is no evidence of malicious behavior, data exfiltration, backdoors, or other supply-chain risky actions within this fragment. The security risk is low to moderate, contingent on the trustworthiness of the adapter implementation.

Confidence: 1.00

Severity: 0.60

From: ?npm/css-select@5.2.2

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/css-select@5.2.2. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm css-tree is 100.0% likely to have a medium risk anomaly

Notes: The analyzed code is a standard, well-structured CSS-values parser fragment with no inherent malicious behavior detected. Security risk in isolation is low, assuming the tokenizer dependency is trusted and integrity-checked. Primary concerns are supply-chain risk via the external tokenizer and potential DoS from pathological inputs; otherwise, the module operates locally to tokenize and parse input strings into an AST without external side effects.

Confidence: 1.00

Severity: 0.60

From: ?npm/css-tree@2.2.1

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/css-tree@2.2.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Potential code anomaly (AI signal): npm detect-libc is 100.0% likely to have a medium risk anomaly

Notes: The code represents a robust, multi-source libc detection utility for Linux, prioritizing filesystem data, then runtime reports, and finally command-based inference. It shows no malicious behavior and aligns with expected patterns for environment introspection. The main improvement areas are strengthening error visibility and handling edge cases where outputs differ from standard expectations.

Confidence: 1.00

Severity: 0.60

From: ?npm/ava@6.4.1npm/detect-libc@2.0.4

ℹ Read more on: This package | This alert | What is an AI-detected potential code anomaly?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: An AI system found a low-risk anomaly in this package. It may still be fine to use, but you should check that it is safe before proceeding.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/detect-libc@2.0.4. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Low
Low CVE: npm qs's arrayLimit bypass in comma parsing allows denial of service

CVE: GHSA-w7fw-mjwx-w883 qs's arrayLimit bypass in comma parsing allows denial of service (LOW)

Affected versions: >= 6.7.0 < 6.14.2

Patched version: 6.14.2

From: ?npm/@modelcontextprotocol/sdk@1.29.0npm/qs@6.14.0

ℹ Read more on: This package | This alert | What is a mild CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known low severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/qs@6.14.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
Obfuscated code: npm entities is 91.0% likely obfuscated

Confidence: 0.91

Location: Package overview

From: ?npm/entities@4.5.0

ℹ Read more on: This package | This alert | What is obfuscated code?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should not obfuscate their code. Consider not using packages with obfuscated code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/entities@4.5.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@renovate renovate Bot force-pushed the renovate/actions-rust-lang-setup-rust-toolchain-1.x branch 2 times, most recently from 5016528 to cc768d0 Compare April 7, 2026 15:45
@renovate renovate Bot force-pushed the renovate/actions-rust-lang-setup-rust-toolchain-1.x branch from cc768d0 to 03d72a9 Compare April 8, 2026 14:22
@renovate renovate Bot changed the title Update actions-rust-lang/setup-rust-toolchain action to v1.15.4 Update actions-rust-lang/setup-rust-toolchain action to v1.16.0 Apr 13, 2026
@renovate renovate Bot force-pushed the renovate/actions-rust-lang-setup-rust-toolchain-1.x branch 2 times, most recently from 2080278 to 9fb52b2 Compare April 14, 2026 19:16
@renovate renovate Bot changed the title Update actions-rust-lang/setup-rust-toolchain action to v1.16.0 Update actions-rust-lang/setup-rust-toolchain action to v1.16 Apr 21, 2026
@renovate renovate Bot force-pushed the renovate/actions-rust-lang-setup-rust-toolchain-1.x branch 4 times, most recently from 8ace34a to 6cc1b64 Compare April 23, 2026 21:46
@renovate renovate Bot force-pushed the renovate/actions-rust-lang-setup-rust-toolchain-1.x branch 2 times, most recently from 6cb658d to 2dcd250 Compare May 5, 2026 22:02
@renovate renovate Bot changed the title Update actions-rust-lang/setup-rust-toolchain action to v1.16 Update actions-rust-lang/setup-rust-toolchain action to v1.16.1 May 9, 2026
@renovate renovate Bot force-pushed the renovate/actions-rust-lang-setup-rust-toolchain-1.x branch 2 times, most recently from 79872c1 to ad66e7c Compare May 12, 2026 12:58
@renovate renovate Bot force-pushed the renovate/actions-rust-lang-setup-rust-toolchain-1.x branch from ad66e7c to cbb3044 Compare May 20, 2026 15:44
@renovate renovate Bot force-pushed the renovate/actions-rust-lang-setup-rust-toolchain-1.x branch from cbb3044 to 1cdda57 Compare May 20, 2026 18:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant