# -*- encoding: utf-8 -*- # stub: ruby_audit 3.0.0 ruby lib Gem::Specification.new do |s| s.name = "ruby_audit".freeze s.version = "3.0.0".freeze s.required_rubygems_version = Gem::Requirement.new(">= 0".freeze) if s.respond_to? :required_rubygems_version= s.metadata = { "rubygems_mfa_required" => "true" } if s.respond_to? :metadata= s.require_paths = ["lib".freeze] s.authors = ["Jeff Cousens, Mike Saelim".freeze, "John Zhang".freeze, "Cristina Mu\u00F1oz".freeze] s.bindir = "exe".freeze s.date = "2025-01-09" s.description = "RubyAudit checks your current version of Ruby and RubyGems against known security vulnerabilities (CVEs), alerting you if you are using an insecure version. It complements bundler-audit, providing complete coverage for your Ruby stack.".freeze s.email = ["opensource@civisanalytics.com".freeze] s.executables = ["ruby-audit".freeze] s.files = [".github/workflows/test.yml".freeze, ".gitignore".freeze, ".gitmodules".freeze, ".rspec".freeze, ".rubocop.yml".freeze, ".ruby-version".freeze, "CHANGELOG.md".freeze, "CODE_OF_CONDUCT.md".freeze, "CONTRIBUTING.md".freeze, "Gemfile".freeze, "LICENSE.md".freeze, "README.md".freeze, "Rakefile".freeze, "bin/console".freeze, "bin/setup".freeze, "exe/ruby-audit".freeze, "lib/ruby_audit.rb".freeze, "lib/ruby_audit/cli.rb".freeze, "lib/ruby_audit/database.rb".freeze, "lib/ruby_audit/scanner.rb".freeze, "lib/ruby_audit/version.rb".freeze, "ruby_audit.gemspec".freeze] s.homepage = "https://github.com/civisanalytics/ruby_audit".freeze s.licenses = ["GPL-3.0-or-later".freeze] s.required_ruby_version = Gem::Requirement.new([">= 3.1".freeze, "< 3.5".freeze]) s.rubygems_version = "3.5.10".freeze s.summary = "Checks Ruby and RubyGems against known vulnerabilities.".freeze s.specification_version = 4 s.add_runtime_dependency(%q.freeze, ["~> 0.9.0".freeze]) end