Homepage
Not present in the local metadata.
brew package intelligence
Automic Vault tracks rust because plain text crates.io token matters when AI agents run command-line tools on macOS.
overview
Safe, concurrent, practical language
Not present in the local metadata.
No executable aliases were found in the local package database.
radioisotope
`cargo publish` commonly relies on an auth token stored in ~/.cargo/credentials.toml or ~/.cargo/credentials. Our isotope stores that token in the macOS keychain and injects it only when `cargo publish`, `cargo yank`, or `cargo owner` runs.
Local README excerpt
This radioisotope modifies the Homebrew rust package, but only changes the installed cargo launcher. rustc, rustdoc, rustfmt, and other Rust tools continue to run without isotope credential injection.
Plaintext crates.io publishing tokens are commonly stored in ~/.cargo/credentials.toml, or in the legacy ~/.cargo/credentials file, under the default [registry] table. The migration stores one token in the Automic Vault isotope keychain as CARGO_REGISTRY_TOKEN and removes the plaintext token line from the Cargo credentials file.
The post-install hook wraps /opt/rust/bin/cargo. The wrapper enables Cargo's native credential provider protocol for cargo login, logout, publish, yank, and owner, delegating token access to av credential-helper cargo while the original Cargo launcher runs.
[registries.<name>] are not migrated.login, logout, publish, yank, andowner continue to run without the Automic Vault credential provider.
Source: data/radioisotopes/rust/README.md
install metadata
| Package key | brew:rust |
|---|---|
| Last updated | 2026-04-20T03:52:50Z |
| Pulse | updated |
source trail
This page is regenerated by scripts/generate-pkg-pages.py. Deployments refuse to publish if www/pkg/ is stale relative to local package data.