Skip to content

docs: comprehensive issue and PR triage for 2026-02-09#344

Merged
Coldaine merged 2 commits intomainfrom
claude/review-codebase-audit-eWaBT
Feb 9, 2026
Merged

docs: comprehensive issue and PR triage for 2026-02-09#344
Coldaine merged 2 commits intomainfrom
claude/review-codebase-audit-eWaBT

Conversation

@Coldaine
Copy link
Owner

@Coldaine Coldaine commented Feb 9, 2026

Description

This PR documents a comprehensive triage of all 64 open issues and 7 open PRs as of 2026-02-09. The triage was conducted with two independent review passes and cross-referencing via gh api to verify issue bodies and detect false duplicates.

Summary of recommendations:

  • Close 32 issues + 1 PR: Dead STT backends (7), duplicates (10), bot-generated stubs (4), vague/low-priority (9), consistency closures (2)
  • Keep 32 issues: Organized by priority (P0: 7, P1: 5, P2: 20) with clear justification for each
  • Merge 6 PRs: Including dependency updates, CI bifurcation, and test coverage improvements
  • Delete 7 stale branches: Cleanup of merged/superseded work

Type of Change

  • Documentation update
  • Refactoring (no functional changes)

Changelog

  • No changelog needed - This PR contains only internal changes (triage documentation, process documentation)

Explanation: This is a triage audit document that guides future issue/PR management decisions. It is not a user-visible change to the codebase itself.

Documentation

  • Documentation updated (if applicable)
  • All new/modified docs have proper frontmatter metadata
  • Documentation is placed in correct location per playbook structure

Details: New triage document added to docs/triage-2026-02-09.md following the established triage documentation pattern. The document includes:

  • Executive summary with closure/keep/merge counts
  • Detailed rationale for each closure decision organized by category
  • Priority-based organization of kept issues (P0/P1/P2)
  • Concrete PR merge recommendations with notes
  • Stale branch cleanup list
  • Methodology notes documenting the review process and corrections made

Testing

  • No testing needed - Documentation only

Checklist

  • Code follows project style guidelines
  • Self-review completed
  • Comments added for complex/non-obvious code
  • No new warnings introduced
  • Related documentation updated
  • Changelog updated (if user-visible changes)

Related Issues

This triage document provides actionable recommendations for:

Additional Context

Key findings from the triage:

  1. Dead STT Backends: Whisper and Parakeet backends are removed/broken. Only Moonshine works. 7 issues reference deleted files or non-existent migration plans.

  2. Duplicate Reduction: 10 duplicate issues identified and mapped to their better-scoped counterparts or implementing PRs.

  3. Bot-Generated Cleanup: 4 Jules bot meta-tooling issues with no actionable code or concrete plans.

  4. Critical P0 Issues: 7 issues that block correct operation or actively mislead developers (documentation, concurrency bugs, real-time safety violations).

  5. Testing Infrastructure Gap: 8 issues tracking the comprehensive testing framework (feat: text-injection integration testing framework #325) and its dependencies.

  6. Methodology: All issue bodies were verified via gh api. A second-opinion review pass caught

https://claude.ai/code/session_01GU8ikA2kk8oa3Y62CufXVn

Full audit of 64 open issues and 7 PRs. Recommends closing 32 stale/duplicate
issues + 1 PR, keeping 32 actionable issues (prioritized P0-P2), and merging
6 PRs. Verified by two independent review passes with issue body cross-checks.

https://claude.ai/code/session_01GU8ikA2kk8oa3Y62CufXVn
Copilot AI review requested due to automatic review settings February 9, 2026 15:27
@qodo-free-for-open-source-projects

Review Summary by Qodo

Add comprehensive issue and PR triage report for 2026-02-09

📝 Documentation

Grey Divider

Walkthroughs

Description
• Comprehensive audit of 64 open issues and 7 PRs with triage recommendations
• Recommends closing 32 stale/duplicate issues and 1 PR
• Prioritizes 32 actionable issues into P0/P1/P2 categories
• Identifies 6 PRs ready to merge and 7 stale branches for deletion
Diagram
flowchart LR
  A["64 Issues + 7 PRs"] -->|"Audit & Verify"| B["Triage Analysis"]
  B -->|"Close 32 + 1 PR"| C["Dead Backends, Duplicates, Stubs"]
  B -->|"Keep 32 Issues"| D["P0: 7, P1: 5, P2: 20"]
  B -->|"Merge 6 PRs"| E["Dependencies, CI, Tests"]
  B -->|"Delete 7 Branches"| F["Cleanup Merged Work"]
Loading

Grey Divider

File Changes

1. docs/triage-2026-02-09.md 📝 Documentation +196/-0

Comprehensive triage audit with closure and priority recommendations

• New triage document with audit of all 64 open issues and 7 PRs
• Detailed closure recommendations organized by category: dead STT backends (7), duplicates (10),
 bot-generated stubs (4), vague/low-priority (9), consistency closures (2), and 1 PR
• Priority-based organization of 32 kept issues: P0 (7 blocking issues), P1 (5 real bugs), P2 (20
 enhancements/testing/CI)
• Merge recommendations for 6 PRs with notes on dependency updates and CI improvements
• List of 7 stale branches for deletion with cleanup rationale
• Methodology notes documenting two independent review passes and corrections made

docs/triage-2026-02-09.md


Grey Divider

Qodo Logo

Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Adds a new repository documentation artifact capturing an audit/triage snapshot of all open issues and PRs as of 2026-02-09, intended to guide future backlog cleanup and prioritization.

Changes:

  • Add a triage report documenting which issues/PRs to close, keep (with priorities), or merge.
  • Record stale branch cleanup candidates and the triage methodology used.


| PR | Title | Action | Notes |
|----|-------|--------|-------|
| #343 | chore(deps): bump rust-dependencies group (19 updates) | Merge if CI passes | Includes rubato 0.16→1.0 and ratatui 0.29→0.30 (major bumps — review changelogs) |
Copy link

Copilot AI Feb 9, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The Dependabot PR #343 bump listed here says “rubato 0.16→1.0”, but the referenced PR updates rubato to 1.0.1. Consider updating the version text to match the actual PR so the triage doc stays precise.

Suggested change
| #343 | chore(deps): bump rust-dependencies group (19 updates) | Merge if CI passes | Includes rubato 0.16→1.0 and ratatui 0.29→0.30 (major bumps — review changelogs) |
| #343 | chore(deps): bump rust-dependencies group (19 updates) | Merge if CI passes | Includes rubato 0.16→1.0.1 and ratatui 0.29→0.30 (major bumps — review changelogs) |

Copilot uses AI. Check for mistakes.
Comment on lines +1 to +6
# ColdVox Issue & PR Triage — 2026-02-09

Audit of all 64 open issues and 7 open PRs. Verified by two independent review passes
with cross-referencing of actual issue bodies via `gh api`.

**Summary**: Close 32 issues + 1 PR | Keep 32 issues | Merge 6 PRs
Copy link

Copilot AI Feb 9, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This new docs file is missing the required YAML frontmatter block (doc_type/subsystem/version/status/owners/last_reviewed). Per docs/standards.md and the MasterDocumentationPlaybook, all Markdown files under /docs must start with that metadata, and CI may reject files without it.

Copilot uses AI. Check for mistakes.
@qodo-free-for-open-source-projects
Copy link

qodo-free-for-open-source-projects bot commented Feb 9, 2026

Code Review by Qodo

🐞 Bugs (2) 📘 Rule violations (0) 📎 Requirement gaps (0)

Grey Divider


Action required

1. Missing docs frontmatter 🐞 Bug ⛯ Reliability
Description
• The docs CI workflow validates all changed Markdown under docs/ and requires a YAML frontmatter
  block with specific keys.
• docs/triage-2026-02-09.md starts directly with a # heading (no --- frontmatter delimiter),
  so scripts/validate_docs.py will emit an error and exit non-zero.
• Impact: the Docs Validation GitHub Action will fail, blocking merge.
Code

docs/triage-2026-02-09.md[R1-8]

+# ColdVox Issue & PR Triage — 2026-02-09
+
+Audit of all 64 open issues and 7 open PRs. Verified by two independent review passes
+with cross-referencing of actual issue bodies via `gh api`.
+
+**Summary**: Close 32 issues + 1 PR | Keep 32 issues | Merge 6 PRs
+
+---
Evidence
The docs CI workflow runs scripts/validate_docs.py for PRs touching docs/** / **/*.md. That
validator treats any changed docs/*.md as requiring frontmatter starting with --- and containing
all REQUIRED_KEYS, otherwise it exits with status 1. The new triage doc begins with a Markdown
heading and therefore fails the text.startswith('---\n') check.

docs/triage-2026-02-09.md[1-6]
.github/workflows/docs-ci.yml[38-41]
scripts/validate_docs.py[12-19]
scripts/validate_docs.py[62-68]
scripts/validate_docs.py[144-168]

Agent prompt
The issue below was found during a code review. Follow the provided context and guidance below and implement a solution

## Issue description
Docs CI enforces YAML frontmatter for any changed `docs/*.md`. The new `docs/triage-2026-02-09.md` is missing this frontmatter, so `scripts/validate_docs.py` will fail the PR.
### Issue Context
Frontmatter must start with `---` and include at least: `doc_type`, `subsystem`, `version`, `status`, `owners`, `last_reviewed`.
### Fix Focus Areas
- docs/triage-2026-02-09.md[1-8]
### Suggested patch shape
Prepend something like:

ⓘ Copy this prompt and use it to remediate the issue with your preferred AI generation tools



Remediation recommended

2. Misplaced triage report 🐞 Bug ⛯ Reliability
Description
• This is a dated, operational “report/log” style document, but it’s placed at the docs/ root.
• The documentation playbook describes a specific location and retention policy for logs/reports
  under docs/research/logs/.
• Impact: not a build/CI failure, but it increases long-term docs sprawl and makes retention/cleanup
  harder.
Code

docs/triage-2026-02-09.md[R1-4]

+# ColdVox Issue & PR Triage — 2026-02-09
+
+Audit of all 64 open issues and 7 open PRs. Verified by two independent review passes
+with cross-referencing of actual issue bodies via `gh api`.
Evidence
The Master Documentation Playbook defines a structure for transient logs, including an explicit
location under docs/research/logs/ and a migration note to triage reports/logs into research/.
This new file appears to fit that class (dated triage report), but is placed at
docs/triage-2026-02-09.md instead.

docs/triage-2026-02-09.md[1-4]
docs/MasterDocumentationPlaybook.md[188-190]
docs/MasterDocumentationPlaybook.md[251-256]

Agent prompt
The issue below was found during a code review. Follow the provided context and guidance below and implement a solution

## Issue description
A dated triage report is currently added at the `docs/` root. The documentation playbook suggests logs/reports belong under `docs/research/logs/<yyyy-mm-dd>-<topic>.md` with a retention policy.
### Issue Context
This is not a functional/CI blocker, but aligning with the documented structure reduces docs sprawl and makes retention/cleanup consistent.
### Fix Focus Areas
- docs/triage-2026-02-09.md[1-196]
- docs/MasterDocumentationPlaybook.md[188-190]
### Suggested change
Move/rename the file to something like:
- `docs/research/logs/2026-02-09-issue-pr-triage.md`
If you move it, ensure any internal links (if any are added later) reference the new path.

ⓘ Copy this prompt and use it to remediate the issue with your preferred AI generation tools


Grey Divider

ⓘ The new review experience is currently in Beta. Learn more

Grey Divider

Qodo Logo

Comment on lines +1 to +8
# ColdVox Issue & PR Triage — 2026-02-09

Audit of all 64 open issues and 7 open PRs. Verified by two independent review passes
with cross-referencing of actual issue bodies via `gh api`.

**Summary**: Close 32 issues + 1 PR | Keep 32 issues | Merge 6 PRs

---

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Action required

1. Missing docs frontmatter 🐞 Bug ⛯ Reliability

• The docs CI workflow validates all changed Markdown under docs/ and requires a YAML frontmatter
  block with specific keys.
• docs/triage-2026-02-09.md starts directly with a # heading (no --- frontmatter delimiter),
  so scripts/validate_docs.py will emit an error and exit non-zero.
• Impact: the Docs Validation GitHub Action will fail, blocking merge.
Agent Prompt
### Issue description
Docs CI enforces YAML frontmatter for any changed `docs/*.md`. The new `docs/triage-2026-02-09.md` is missing this frontmatter, so `scripts/validate_docs.py` will fail the PR.

### Issue Context
Frontmatter must start with `---` and include at least: `doc_type`, `subsystem`, `version`, `status`, `owners`, `last_reviewed`.

### Fix Focus Areas
- docs/triage-2026-02-09.md[1-8]

### Suggested patch shape
Prepend something like:
```markdown
---
doc_type: research
subsystem: general
version: 0.1.0
status: draft
owners: Maintainers
last_reviewed: 2026-02-09
---

# ColdVox Issue & PR Triage — 2026-02-09
```
Adjust values as appropriate for your doc taxonomy/ownership.

ⓘ Copy this prompt and use it to remediate the issue with your preferred AI generation tools

Addresses PR review feedback:
- Add required YAML frontmatter (doc_type, subsystem, version, status, owners, last_reviewed)
- Move to docs/plans/2026-02-09-pr-triage-action-plan.md (matches existing pattern)
- Fixes: This is an action plan, not a research log

Fixes CI failure: "missing frontmatter delimiter"

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
@Coldaine Coldaine force-pushed the claude/review-codebase-audit-eWaBT branch from 3966b47 to 91852fc Compare February 9, 2026 16:04
@qodo-free-for-open-source-projects

CI Feedback 🧐

A test triggered by this PR failed. Here is an AI-generated analysis of the failure:

Action: Security Audit

Failed stage: Run cargo audit [❌]

Failed test name: ""

Failure summary:

The action failed during the cargo audit step because RustSec reported vulnerabilities in the
dependency lockfile (Cargo.lock), causing cargo audit to exit with code 1.
- Found a vulnerability
in crate bytes version 1.11.0 (advisory RUSTSEC-2026-0007: integer overflow in BytesMut::reserve).
-
Also reported an additional advisory for crate lru version 0.12.5 (advisory RUSTSEC-2026-0002:
marked unsound), contributing to the total of 2 vulnerabilities found.
- The workflow treats these
findings as a failure (error: 2 vulnerabilities found!), leading to Process completed with exit code
1 (around log lines 979-985 and 1060-1072).

Relevant error logs:
1:  ##[group]Runner Image Provisioner
2:  Hosted Compute Agent
...

429:  ##[group]Run cargo install cargo-audit --locked || true
430:  �[36;1mcargo install cargo-audit --locked || true�[0m
431:  �[36;1mcargo install cargo-deny --locked || true�[0m
432:  shell: /usr/bin/bash --noprofile --norc -e -o pipefail {0}
433:  env:
434:  CARGO_TERM_COLOR: always
435:  WHISPER_MODEL_SIZE: tiny
436:  MIN_FREE_DISK_GB: 10
437:  MAX_LOAD_AVERAGE: 5
438:  CARGO_INCREMENTAL: 0
439:  CARGO_PROFILE_DEV_DEBUG: 0
440:  RUST_BACKTRACE: short
441:  RUSTFLAGS: -D warnings
442:  CARGO_UNSTABLE_SPARSE_REGISTRY: true
443:  CARGO_REGISTRIES_CRATES_IO_PROTOCOL: sparse
444:  CACHE_ON_FAILURE: true
445:  ##[endgroup]
...

505:  �[1m�[92m  Downloaded�[0m rustls-platform-verifier v0.6.2
506:  �[1m�[92m  Downloaded�[0m platforms v3.8.0
507:  �[1m�[92m  Downloaded�[0m owo-colors v4.2.3
508:  �[1m�[92m  Downloaded�[0m litemap v0.8.1
509:  �[1m�[92m  Downloaded�[0m clap_builder v4.5.57
510:  �[1m�[92m  Downloaded�[0m writeable v0.6.2
511:  �[1m�[92m  Downloaded�[0m tower v0.5.3
512:  �[1m�[92m  Downloaded�[0m toml-span v0.6.0
513:  �[1m�[92m  Downloaded�[0m time-macros v0.2.25
514:  �[1m�[92m  Downloaded�[0m socket2 v0.6.2
515:  �[1m�[92m  Downloaded�[0m rustls-native-certs v0.8.3
516:  �[1m�[92m  Downloaded�[0m hyper v1.8.1
517:  �[1m�[92m  Downloaded�[0m tokio v1.49.0
518:  �[1m�[92m  Downloaded�[0m h2 v0.4.13
519:  �[1m�[92m  Downloaded�[0m tokio-rustls v0.26.4
520:  �[1m�[92m  Downloaded�[0m thiserror-impl v2.0.18
521:  �[1m�[92m  Downloaded�[0m synstructure v0.13.2
...

551:  �[1m�[92m  Downloaded�[0m quinn-udp v0.5.14
552:  �[1m�[92m  Downloaded�[0m kstring v2.0.2
553:  �[1m�[92m  Downloaded�[0m gix-protocol v0.56.0
554:  �[1m�[92m  Downloaded�[0m gix-index v0.46.0
555:  �[1m�[92m  Downloaded�[0m ring v0.17.14
556:  �[1m�[92m  Downloaded�[0m gix-attributes v0.30.0
557:  �[1m�[92m  Downloaded�[0m clru v0.6.2
558:  �[1m�[92m  Downloaded�[0m cargo-lock v11.0.1
559:  �[1m�[92m  Downloaded�[0m http-body-util v0.1.3
560:  �[1m�[92m  Downloaded�[0m gix-revwalk v0.26.0
561:  �[1m�[92m  Downloaded�[0m gix-revision v0.40.0
562:  �[1m�[92m  Downloaded�[0m gix-ref v0.58.0
563:  �[1m�[92m  Downloaded�[0m gix-path v0.11.0
564:  �[1m�[92m  Downloaded�[0m gix-packetline v0.21.0
565:  �[1m�[92m  Downloaded�[0m gix-object v0.55.0
566:  �[1m�[92m  Downloaded�[0m gix-error v0.0.0
567:  �[1m�[92m  Downloaded�[0m gix-chunk v0.5.0
...

580:  �[1m�[92m  Downloaded�[0m gix-tempfile v21.0.0
581:  �[1m�[92m  Downloaded�[0m gix-shallow v0.8.0
582:  �[1m�[92m  Downloaded�[0m gix-ignore v0.19.0
583:  �[1m�[92m  Downloaded�[0m gix-filter v0.25.0
584:  �[1m�[92m  Downloaded�[0m gix-date v0.13.0
585:  �[1m�[92m  Downloaded�[0m gix-credentials v0.35.0
586:  �[1m�[92m  Downloaded�[0m gix-bitmap v0.2.15
587:  �[1m�[92m  Downloaded�[0m gix-actor v0.38.0
588:  �[1m�[92m  Downloaded�[0m fs-err v3.2.2
589:  �[1m�[92m  Downloaded�[0m syn v2.0.114
590:  �[1m�[92m  Downloaded�[0m sha1-checked v0.10.0
591:  �[1m�[92m  Downloaded�[0m rustls-pki-types v1.14.0
592:  �[1m�[92m  Downloaded�[0m gix-quote v0.6.1
593:  �[1m�[92m  Downloaded�[0m gix-lock v21.0.0
594:  �[1m�[92m  Downloaded�[0m gix-hashtable v0.12.0
595:  �[1m�[92m  Downloaded�[0m thiserror v2.0.18
596:  �[1m�[92m  Downloaded�[0m stable_deref_trait v1.2.1
...

607:  �[1m�[92m  Downloaded�[0m rustc-hash v2.1.1
608:  �[1m�[92m  Downloaded�[0m quinn v0.11.9
609:  �[1m�[92m  Downloaded�[0m maybe-async v0.2.10
610:  �[1m�[92m  Downloaded�[0m icu_provider v2.1.1
611:  �[1m�[92m  Downloaded�[0m icu_properties v2.1.2
612:  �[1m�[92m  Downloaded�[0m icu_normalizer_data v2.1.1
613:  �[1m�[92m  Downloaded�[0m icu_normalizer v2.1.1
614:  �[1m�[92m  Downloaded�[0m icu_locale_core v2.1.1
615:  �[1m�[92m  Downloaded�[0m gix-discover v0.46.0
616:  �[1m�[92m  Downloaded�[0m find-msvc-tools v0.1.9
617:  �[1m�[92m  Downloaded�[0m compression-codecs v0.4.36
618:  �[1m�[92m  Downloaded�[0m idna_adapter v1.2.1
619:  �[1m�[92m  Downloaded�[0m hash32 v0.3.1
620:  �[1m�[92m  Downloaded�[0m gix-sec v0.13.0
621:  �[1m�[92m  Downloaded�[0m faster-hex v0.10.0
622:  �[1m�[92m  Downloaded�[0m display-error-chain v0.2.2
623:  �[1m�[92m  Downloaded�[0m compression-core v0.4.31
...

654:  �[1m�[92m  Downloaded�[0m addr2line v0.25.1
655:  �[1m�[92m  Downloaded�[0m aws-lc-sys v0.37.0
656:  �[1m�[92m   Compiling�[0m proc-macro2 v1.0.106
657:  �[1m�[92m   Compiling�[0m quote v1.0.44
658:  �[1m�[92m   Compiling�[0m unicode-ident v1.0.22
659:  �[1m�[92m   Compiling�[0m libc v0.2.180
660:  �[1m�[92m   Compiling�[0m memchr v2.7.6
661:  �[1m�[92m   Compiling�[0m cfg-if v1.0.4
662:  �[1m�[92m   Compiling�[0m regex-syntax v0.8.9
663:  �[1m�[92m   Compiling�[0m syn v2.0.114
664:  �[1m�[92m   Compiling�[0m aho-corasick v1.1.4
665:  �[1m�[92m   Compiling�[0m smallvec v1.15.1
666:  �[1m�[92m   Compiling�[0m once_cell v1.21.3
667:  �[1m�[92m   Compiling�[0m bytes v1.11.1
668:  �[1m�[92m   Compiling�[0m regex-automata v0.4.14
669:  �[1m�[92m   Compiling�[0m thiserror v2.0.18
670:  �[1m�[92m   Compiling�[0m bstr v1.12.1
671:  �[1m�[92m   Compiling�[0m thiserror-impl v2.0.18
672:  �[1m�[92m   Compiling�[0m stable_deref_trait v1.2.1
...

694:  �[1m�[92m   Compiling�[0m typenum v1.19.0
695:  �[1m�[92m   Compiling�[0m version_check v0.9.5
696:  �[1m�[92m   Compiling�[0m equivalent v1.0.2
697:  �[1m�[92m   Compiling�[0m foldhash v0.2.0
698:  �[1m�[92m   Compiling�[0m allocator-api2 v0.2.21
699:  �[1m�[92m   Compiling�[0m hashbrown v0.16.1
700:  �[1m�[92m   Compiling�[0m generic-array v0.14.7
701:  �[1m�[92m   Compiling�[0m heapless v0.8.0
702:  �[1m�[92m   Compiling�[0m byteorder v1.5.0
703:  �[1m�[92m   Compiling�[0m hash32 v0.3.1
704:  �[1m�[92m   Compiling�[0m gix-features v0.46.0
705:  �[1m�[92m   Compiling�[0m block-buffer v0.10.4
706:  �[1m�[92m   Compiling�[0m crypto-common v0.1.7
707:  �[1m�[92m   Compiling�[0m digest v0.10.7
708:  �[1m�[92m   Compiling�[0m faster-hex v0.10.0
709:  �[1m�[92m   Compiling�[0m gix-error v0.0.0
710:  �[1m�[92m   Compiling�[0m cpufeatures v0.2.17
...

925:  �[1m�[92m   Compiling�[0m time v0.3.45
926:  �[1m�[92m   Compiling�[0m tracing-subscriber v0.3.22
927:  �[1m�[92m   Compiling�[0m abscissa_derive v0.9.0
928:  �[1m�[92m   Compiling�[0m color-eyre v0.6.5
929:  �[1m�[92m   Compiling�[0m auditable-info v0.10.0
930:  �[1m�[92m   Compiling�[0m clap v4.5.57
931:  �[1m�[92m   Compiling�[0m cargo-lock v11.0.1
932:  �[1m�[92m   Compiling�[0m quitters v0.1.0
933:  �[1m�[92m   Compiling�[0m platforms v3.8.0
934:  �[1m�[92m   Compiling�[0m secrecy v0.10.3
935:  �[1m�[92m   Compiling�[0m cvss v2.2.0
936:  �[1m�[92m   Compiling�[0m wait-timeout v0.2.1
937:  �[1m�[92m   Compiling�[0m termcolor v1.4.1
938:  �[1m�[92m   Compiling�[0m canonical-path v2.0.2
939:  �[1m�[92m   Compiling�[0m abscissa_core v0.9.0
940:  �[1m�[92m   Compiling�[0m display-error-chain v0.2.2
941:  �[1m�[92m   Compiling�[0m rustls-webpki v0.103.9
...

958:  �[1m�[92m     Ignored�[0m package `cargo-deny v0.19.0` is already installed, use --force to override
959:  ##[group]Run cargo audit
960:  �[36;1mcargo audit�[0m
961:  shell: /usr/bin/bash --noprofile --norc -e -o pipefail {0}
962:  env:
963:  CARGO_TERM_COLOR: always
964:  WHISPER_MODEL_SIZE: tiny
965:  MIN_FREE_DISK_GB: 10
966:  MAX_LOAD_AVERAGE: 5
967:  CARGO_INCREMENTAL: 0
968:  CARGO_PROFILE_DEV_DEBUG: 0
969:  RUST_BACKTRACE: short
970:  RUSTFLAGS: -D warnings
971:  CARGO_UNSTABLE_SPARSE_REGISTRY: true
972:  CARGO_REGISTRIES_CRATES_IO_PROTOCOL: sparse
973:  CACHE_ON_FAILURE: true
974:  ##[endgroup]
975:  �[0m�[0m�[1m�[32m    Fetching�[0m advisory database from `https://github.com/RustSec/advisory-db.git`
976:  �[0m�[0m�[1m�[32m      Loaded�[0m 916 security advisories (from /home/runner/.cargo/advisory-db)
977:  �[0m�[0m�[1m�[32m    Updating�[0m crates.io index
978:  �[0m�[0m�[1m�[32m    Scanning�[0m Cargo.lock for vulnerabilities (557 crate dependencies)
979:  �[0m�[0m�[1m�[31mCrate:    �[0m bytes
980:  �[0m�[0m�[1m�[31mVersion:  �[0m 1.11.0
981:  �[0m�[0m�[1m�[31mTitle:    �[0m Integer overflow in `BytesMut::reserve`
982:  �[0m�[0m�[1m�[31mDate:     �[0m 2026-02-03
983:  �[0m�[0m�[1m�[31mID:       �[0m RUSTSEC-2026-0007
984:  �[0m�[0m�[1m�[31merror:�[0m 2 vulnerabilities found!
985:  �[0m�[0m�[1m�[33mwarning:�[0m 2 allowed warnings found
...

1056:  ├── ratatui 0.29.0
1057:  │   └── coldvox-app 0.1.0
1058:  └── macro_rules_attribute 0.2.2
1059:  └── tokenizers 0.22.2
1060:  �[0m�[0m�[1m�[33mCrate:    �[0m lru
1061:  �[0m�[0m�[1m�[33mVersion:  �[0m 0.12.5
1062:  �[0m�[0m�[1m�[33mWarning:  �[0m unsound
1063:  �[0m�[0m�[1m�[33mTitle:    �[0m `IterMut` violates Stacked Borrows by invalidating internal pointer
1064:  �[0m�[0m�[1m�[33mDate:     �[0m 2026-01-07
1065:  �[0m�[0m�[1m�[33mID:       �[0m RUSTSEC-2026-0002
1066:  �[0m�[0m�[1m�[33mURL:      �[0m https://rustsec.org/advisories/RUSTSEC-2026-0002
1067:  �[0m�[0m�[1m�[33mDependency tree:
1068:  �[0mlru 0.12.5
1069:  └── ratatui 0.29.0
1070:  └── coldvox-app 0.1.0
1071:  ##[error]Process completed with exit code 1.
1072:  Post job cleanup.

@Coldaine Coldaine merged commit 35e8463 into main Feb 9, 2026
2 of 6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants