Skip to content

Commit 6ad781f

Browse files
committed
docs: fix url
1 parent 259a670 commit 6ad781f

10 files changed

Lines changed: 16 additions & 16 deletions

File tree

Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ edition = "2024"
2020
rust-version = "1.85.0"
2121
readme = "README.md"
2222
license = "Apache-2.0"
23-
repository = "https://github.com/bordumb/capsec"
23+
repository = "https://github.com/auths-dev/capsec"
2424

2525
[workspace.dependencies]
2626
# Core

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# capsec
22

3-
[![CI](https://github.com/bordumb/capsec/actions/workflows/ci.yml/badge.svg)](https://github.com/bordumb/capsec/actions/workflows/ci.yml)
3+
[![CI](https://github.com/auths-dev/capsec/actions/workflows/ci.yml/badge.svg)](https://github.com/auths-dev/capsec/actions/workflows/ci.yml)
44
[![crates.io](https://img.shields.io/crates/v/capsec.svg)](https://crates.io/crates/capsec)
55
[![docs.rs](https://docs.rs/capsec/badge.svg)](https://docs.rs/capsec)
66

@@ -81,8 +81,8 @@ jobs:
8181
New high-risk I/O in a PR? CI fails. No new I/O? CI passes. Teams can adopt incrementally with `--baseline` and `--diff` to only flag *new* findings.
8282

8383
To see it in action, you can reference these:
84-
* [CI/CD](https://github.com/bordumb/capsec/blob/main/.github/workflows/ci.yml#L57)
85-
* [Pre-Commit Hook](https://github.com/bordumb/capsec/blob/main/.pre-commit-config.yaml#L32)
84+
* [CI/CD](https://github.com/auths-dev/capsec/blob/main/.github/workflows/ci.yml#L57)
85+
* [Pre-Commit Hook](https://github.com/auths-dev/capsec/blob/main/.pre-commit-config.yaml#L32)
8686

8787
---
8888

SECURITY.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,6 @@ Known blind spots (documented in `capsec-tests/tests/audit_evasion.rs`):
8383

8484
## Reporting vulnerabilities
8585

86-
If you discover a security issue in capsec, please email the maintainers directly rather than opening a public issue. Contact: [open an issue with the `security` label](https://github.com/bordumb/capsec/issues/new?labels=security).
86+
If you discover a security issue in capsec, please email the maintainers directly rather than opening a public issue. Contact: [open an issue with the `security` label](https://github.com/auths-dev/capsec/issues/new?labels=security).
8787

8888
For issues that are not security-sensitive (e.g., audit tool false negatives, documentation gaps), please open a regular GitHub issue.

crates/capsec-core/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
Zero-cost capability tokens and permission traits for compile-time capability-based security in Rust.
44

5-
This is the foundation crate of the [capsec](https://github.com/bordumb/capsec) ecosystem. You probably want to depend on the `capsec` facade crate instead of using this directly.
5+
This is the foundation crate of the [capsec](https://github.com/auths-dev/capsec) ecosystem. You probably want to depend on the `capsec` facade crate instead of using this directly.
66

77
## What's in here
88

crates/capsec-macro/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# capsec-macro
22

3-
Procedural macros for the [capsec](https://github.com/bordumb/capsec) capability-based security system.
3+
Procedural macros for the [capsec](https://github.com/auths-dev/capsec) capability-based security system.
44

55
You probably want to depend on the `capsec` facade crate instead of using this directly — it re-exports these macros.
66

crates/capsec-std/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
Capability-gated wrappers around `std::fs`, `std::net`, `std::env`, and `std::process`.
44

5-
This is the enforcement layer of [capsec](https://github.com/bordumb/capsec). Every function mirrors a `std` function but requires a capability token proving the caller has permission. You probably want to depend on the `capsec` facade crate instead of using this directly.
5+
This is the enforcement layer of [capsec](https://github.com/auths-dev/capsec). Every function mirrors a `std` function but requires a capability token proving the caller has permission. You probably want to depend on the `capsec` facade crate instead of using this directly.
66

77
## Example
88

crates/cargo-capsec/src/main.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -419,7 +419,7 @@ fn run_badge(args: BadgeArgs) {
419419
// Markdown badge
420420
let encoded_message = message.replace(' ', "%20");
421421
println!(
422-
"[![capsec](https://img.shields.io/badge/capsec-{encoded_message}-{color})](https://github.com/bordumb/capsec)"
422+
"[![capsec](https://img.shields.io/badge/capsec-{encoded_message}-{color})](https://github.com/auths-dev/capsec)"
423423
);
424424
}
425425
}

crates/cargo-capsec/src/reporter.rs

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -389,8 +389,8 @@ pub fn report_sarif(
389389
"text": format!("{}. Detected by capsec static analysis.", f.description)
390390
},
391391
"help": {
392-
"text": format!("{}\n\nSee https://github.com/bordumb/capsec for details on capability-based security in Rust.", f.description),
393-
"markdown": format!("**{}**\n\n[capsec documentation](https://github.com/bordumb/capsec)", f.description)
392+
"text": format!("{}\n\nSee https://github.com/auths-dev/capsec for details on capability-based security in Rust.", f.description),
393+
"markdown": format!("**{}**\n\n[capsec documentation](https://github.com/auths-dev/capsec)", f.description)
394394
},
395395
"defaultConfiguration": {
396396
"level": risk_to_sarif_level(f.risk)
@@ -456,8 +456,8 @@ pub fn report_sarif(
456456
"text": "A crate declared as 'pure' in [package.metadata.capsec] has ambient authority findings. Pure crates must not perform I/O."
457457
},
458458
"help": {
459-
"text": "Either remove the I/O operations or change the classification to 'resource'.\n\nSee https://github.com/bordumb/capsec for details.",
460-
"markdown": "**Purity violation**: either remove I/O or reclassify as `resource`.\n\n[capsec documentation](https://github.com/bordumb/capsec)"
459+
"text": "Either remove the I/O operations or change the classification to 'resource'.\n\nSee https://github.com/auths-dev/capsec for details.",
460+
"markdown": "**Purity violation**: either remove I/O or reclassify as `resource`.\n\n[capsec documentation](https://github.com/auths-dev/capsec)"
461461
},
462462
"defaultConfiguration": {
463463
"level": "error"
@@ -493,7 +493,7 @@ pub fn report_sarif(
493493
"name": "capsec-cli",
494494
"version": env!("CARGO_PKG_VERSION"),
495495
"semanticVersion": env!("CARGO_PKG_VERSION"),
496-
"informationUri": "https://github.com/bordumb/capsec",
496+
"informationUri": "https://github.com/auths-dev/capsec",
497497
"rules": rules
498498
}
499499
},

docs/blog/ecosystem-audit-report.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# What Can Your Dependencies Do? An Ambient Authority Audit of the Rust Ecosystem
22

33
**Date:** 2026-03-19
4-
**Tool:** [capsec](https://github.com/bordumb/capsec) — static capability audit for Rust
4+
**Tool:** [capsec](https://github.com/auths-dev/capsec) — static capability audit for Rust
55

66
## Introduction
77

scripts/releases/1_github.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ def main() -> None:
161161
sys.exit(1)
162162

163163
print(f"\nDone. Release workflow will run at:")
164-
print(f" https://github.com/bordumb/capsec/actions")
164+
print(f" https://github.com/auths-dev/capsec/actions")
165165

166166

167167
if __name__ == "__main__":

0 commit comments

Comments
 (0)