govulncheck

Edit Package govulncheck
https://github.com/golang/vuln

govulncheck is a CLI tool to report known vulnerabilities that affect Go code. It uses static analysis of source code or a binary's symbol table to narrow down reports to only those that could affect the application.

By default, govulncheck makes requests to the Go vulnerability database at https://vuln.go.dev. Requests to the vulnerability database contain only module paths, not code or other properties of your program. See https://vuln.go.dev/privacy.html for more. Use the -db flag to specify a different database, which must implement the specification at https://go.dev/security/vuln/database.

Refresh
Refresh
Source Files
Filename Size Changed
_service 0000000711 711 Bytes
_servicedata 0000000232 232 Bytes
govulncheck-1.1.1.tar.gz 0001914698 1.83 MB
govulncheck.changes 0000010188 9.95 KB
govulncheck.spec 0000002004 1.96 KB
vendor.tar.gz 0000520700 508 KB
Revision 7 (latest revision is 10)
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1176500 from Jeff Kowalczyk's avatar Jeff Kowalczyk (jfkw) (revision 7)
- Update to version 1.1.1:
  * all: remove unit tests for staticcheck, unparam, and spellcheck
  * internal/sarif,cmd/govulncheck: publicize sarif
  * internal/vulncheck: load source code for scan symbol mode only
  * all: update golang.org/x/tools
  * internal/vulncheck: emit progress message instead of warning
  * internal/scan: improve textual output for binary traces
  * internal/buildinfo: avoid panic on nil symbol for elf
  * internal/sarif: improve GOMODCACHE relative paths
  * internal/sarif: add version to module info for locations
  * internal/sarif: remove originalURIBaseIds
  * go.mod: update golang.org/x dependencies
  * internal/gosym: preallocate inlined call slice
  * internal/vulncheck: improve progress message for binaries
  * internal/vulncheck: emit fetch db and vuln checking progress messages
  * internal/scan: print progress messages only in verbose mode
  * internal/scan: refactor flag usage in text handler
  * Revert "internal/scan: disallow multiple patterns in source mode"
  * internal/sarif: add missing required Message field
  * internal/scan: disallow multiple patterns in source mode
  * internal/vulncheck: use new improved DeleteSyntheticNodes (forwarded request 1176498 from jfkw)
Comments 0
openSUSE Build Service is sponsored by