You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Unfortunately, Windows has started identifying compilation artifacts from phf on my machine as a threat; this is because at least one proc-macro-hack artifact in the user's Temp folder are is identified as a threat:
Note:As of Rust 1.45 this crate is superseded by native support for #[proc_macro] in expression position. Only consider using this crate if you care about supporting compilers between 1.31 and 1.45.
...my conclusion is that phf and phf_macros should shed their proc-macro-hack dependencies as the best way to resolve this issue. Will file a PR shortly for this, as migration is a light lift.
ErichDonGubler
changed the title
Windows Defender identifies proc-macro-hack transitive dependency as a threat
Windows Defender identifies proc-macro-hack dependency artifacts as a threat
Jul 15, 2022
Unfortunately, Windows has started identifying compilation artifacts from
phf
on my machine as a threat; this is because at least oneproc-macro-hack
artifact in the user'sTemp
folder are is identified as a threat:Because the MSRV of this crate is 1.46, and upstream
proc-macro-hack
's repo README.md states:...my conclusion is that
phf
andphf_macros
should shed theirproc-macro-hack
dependencies as the best way to resolve this issue. Will file a PR shortly for this, as migration is a light lift.Additional info:
proc-macro-hack
's transitive dependency artifacts as a threat Ogeon/palette#289, where I've filed an issue againstpalette
as a consumer of this crate.The text was updated successfully, but these errors were encountered: