rustsec-2026-0083
Vulnerability from osv_rustsec
Published
2026-04-07 12:00
Modified
2026-04-08 08:55
Summary
zantetsu-trainer is unmaintained
Details

The zantetsu-trainer crate is no longer maintained. The ML training infrastructure it contained was removed as part of the zantetsu 0.2 release, which replaced the neural parser with a pure heuristic engine.

A tombstone version (0.2.0) has been published and 0.1.4 has been yanked. There is no replacement for zantetsu-trainer.

Migration

If you were using zantetsu-trainer as part of a zantetsu-based filename parsing pipeline, switch to zantetsu 0.2, which requires no training step.


{
  "affected": [
    {
      "database_specific": {
        "categories": [],
        "cvss": null,
        "informational": "unmaintained"
      },
      "ecosystem_specific": {
        "affected_functions": null,
        "affects": {
          "arch": [],
          "functions": [],
          "os": []
        }
      },
      "package": {
        "ecosystem": "crates.io",
        "name": "zantetsu-trainer",
        "purl": "pkg:cargo/zantetsu-trainer"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0.0.0-0"
            }
          ],
          "type": "SEMVER"
        }
      ],
      "versions": []
    }
  ],
  "aliases": [],
  "database_specific": {
    "license": "CC0-1.0"
  },
  "details": "The `zantetsu-trainer` crate is no longer maintained. The ML training\ninfrastructure it contained was removed as part of the zantetsu 0.2 release,\nwhich replaced the neural parser with a pure heuristic engine.\n\nA tombstone version (0.2.0) has been published and 0.1.4 has been yanked.\nThere is no replacement for `zantetsu-trainer`.\n\n## Migration\n\nIf you were using `zantetsu-trainer` as part of a zantetsu-based filename\nparsing pipeline, switch to [`zantetsu 0.2`](https://crates.io/crates/zantetsu),\nwhich requires no training step.",
  "id": "RUSTSEC-2026-0083",
  "modified": "2026-04-08T08:55:27Z",
  "published": "2026-04-07T12:00:00Z",
  "references": [
    {
      "type": "PACKAGE",
      "url": "https://crates.io/crates/zantetsu-trainer"
    },
    {
      "type": "ADVISORY",
      "url": "https://rustsec.org/advisories/RUSTSEC-2026-0083.html"
    },
    {
      "type": "REPORT",
      "url": "https://github.com/enrell/psyche/issues/1"
    }
  ],
  "related": [],
  "severity": [],
  "summary": "zantetsu-trainer is unmaintained"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…