@@ -99,14 +99,10 @@ pub fn check_data_exfiltration(model: &ReachabilityModel) -> Vec<Finding> {
9999 . to_owned ( ) ,
100100 ) ;
101101 }
102- remediation. push (
103- "Restrict filesystem read access to only the paths the agent needs." . to_owned ( ) ,
104- ) ;
102+ remediation
103+ . push ( "Restrict filesystem read access to only the paths the agent needs." . to_owned ( ) ) ;
105104
106- let paths: Vec < FindingPath > = exfil_paths
107- . into_iter ( )
108- . map ( FindingPath :: Exfil )
109- . collect ( ) ;
105+ let paths: Vec < FindingPath > = exfil_paths. into_iter ( ) . map ( FindingPath :: Exfil ) . collect ( ) ;
110106
111107 let n_paths = paths. len ( ) ;
112108 vec ! [ Finding {
@@ -142,8 +138,7 @@ pub fn check_write_bypass(model: &ReachabilityModel) -> Vec<Finding> {
142138
143139 // Check: binary bypasses L7 and can write
144140 if cap. bypasses_l7 ( ) && cap. can_write ( ) {
145- let cred_actions =
146- collect_credential_actions ( model, & ep. host , & cap) ;
141+ let cred_actions = collect_credential_actions ( model, & ep. host , & cap) ;
147142 if !cred_actions. is_empty ( )
148143 || model. credentials . credentials_for_host ( & ep. host ) . is_empty ( )
149144 {
@@ -161,8 +156,7 @@ pub fn check_write_bypass(model: &ReachabilityModel) -> Vec<Finding> {
161156
162157 // Check: L4-only endpoint + binary can construct HTTP + credential has write
163158 if !ep. is_l7_enforced ( ) && cap. can_construct_http {
164- let cred_actions =
165- collect_credential_actions ( model, & ep. host , & cap) ;
159+ let cred_actions = collect_credential_actions ( model, & ep. host , & cap) ;
166160 if !cred_actions. is_empty ( ) {
167161 bypass_paths. push ( WriteBypassPath {
168162 binary : b. path . clone ( ) ,
@@ -193,9 +187,7 @@ pub fn check_write_bypass(model: &ReachabilityModel) -> Vec<Finding> {
193187 vec ! [ Finding {
194188 query: "write_bypass" . to_owned( ) ,
195189 title: "Write Bypass Detected — Read-Only Intent Violated" . to_owned( ) ,
196- description: format!(
197- "{n} path(s) allow write operations despite read-only policy intent."
198- ) ,
190+ description: format!( "{n} path(s) allow write operations despite read-only policy intent." ) ,
199191 risk: RiskLevel :: High ,
200192 paths,
201193 remediation: vec![
0 commit comments