Go module
github.com/Clever/wag/v6
check_circle
arrow_drop_downv6.4.5
Default versionwarning
Warning
The highest tagged major version of this Go module is github.com/Clever/wag/v6.
Security Advisories
18
In the dependencies
Similar advisories
go.mongodb.org/mongo-driver improperly validates cstrings when marshalling Go objects into BSON
6.8 MODERATE·GHSA-f6mq-5m25-4r72
Similar advisories
golang.org/x/text/language Out-of-bounds Read vulnerability
7.5 HIGH·GHSA-ppp9-7jff-5vj2
Similar advisories
golang.org/x/net/html Infinite Loop vulnerability
7.5 HIGH·GHSA-83g2-8m93-v3w7
Similar advisories
golang.org/x/net/http/httpguts vulnerable to Uncontrolled Recursion
5.9 MODERATE·GHSA-h86h-8ppg-mxmh
Similar advisories
golang.org/x/sys/unix has Incorrect privilege reporting in syscall
5.3 MODERATE·GHSA-p782-xgp4-8hr8
Panic in gopkg.in/yaml.v3
GO-2022-0603
Similar advisories
gopkg.in/yaml.v3 Denial of Service
7.5 HIGH·GHSA-hp87-p4gw-j4gq
Similar advisories
golang.org/x/net/http2 Denial of Service vulnerability
7.5 HIGH·GHSA-69cg-p879-7622
Similar advisories
golang.org/x/text/language Denial of service via crafted Accept-Language header
7.5 HIGH·GHSA-69ch-w2m2-3vjp
Similar advisories
golang.org/x/net/http2 vulnerable to possible excessive memory growth
5.3 MODERATE·GHSA-xrjj-mj9h-534m
Similar advisories
golang.org/x/net vulnerable to Uncontrolled Resource Consumption
7.5 HIGH·GHSA-vvpx-j8f3-3w6h
Similar advisories
Improper rendering of text nodes in golang.org/x/net/html
6.1 MODERATE·GHSA-2wrh-6pvc-2jm9
Similar advisories
HTTP/2 rapid reset can cause excessive work in net/http
7.5 HIGH·GHSA-4374-p667-p6c8
Similar advisories
net/http, x/net/http2: close connections when receiving too many headers
5.3 MODERATE·GHSA-4v7x-pqxf-cx7m
Similar advisories
Non-linear parsing of case-insensitive content in golang.org/x/net/html
HIGH·GHSA-w32m-9786-jp63
HTTP/2 Stream Cancellation Attack
5.3 MODERATE·GHSA-qppj-fm5r-hxr3
Dependents
This package has no known dependents.
Package metadata as of .
Projects
Clever/wag
GitHub
sWAGger - Web API Generator
call_split 7 forks
star 77 stars
OpenSSF scorecard
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
View information about checks and how to fix failures.
Score
4.3/10
Scorecard as of .
Code-Review
10/10
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
Reasoning
all changesets reviewed
Dangerous-Workflow
10/10
Determines if the project's GitHub Action workflows avoid dangerous patterns.
Reasoning
no dangerous workflow patterns detected
Token-Permissions
0/10
Determines if the project's workflows follow the principle of least privilege.
Reasoning
detected GitHub workflow tokens with excessive permissions
Maintained
10/10
Determines if the project is "actively maintained".
Reasoning
28 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
CII-Best-Practices
0/10
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Reasoning
no effort to earn an OpenSSF best practices badge detected
Binary-Artifacts
10/10
Determines if the project has generated executable (binary) artifacts in the source repository.
Reasoning
no binaries found in the repo
Security-Policy
0/10
Determines if the project has published a security policy.
Reasoning
security policy file not detected
License
10/10
Determines if the project has defined a license.
Reasoning
license file detected
Fuzzing
0/10
Determines if the project uses fuzzing.
Reasoning
project is not fuzzed
Signed-Releases
0/10
Determines if the project cryptographically signs release artifacts.
Reasoning
Project has not signed or included provenance with any releases.
Pinned-Dependencies
0/10
Determines if the project has declared and pinned the dependencies of its build process.
Reasoning
dependency not pinned by hash detected -- score normalized to 0
Branch-Protection
4/10
Determines if the default and release branches are protected with GitHub's branch protection settings.
Reasoning
branch protection is not maximal on development and all release branches
SAST
0/10
Determines if the project uses static code analysis.
Reasoning
SAST tool is not run on all commits -- score normalized to 0
Vulnerabilities
0/10
Determines if the project has open, known unfixed vulnerabilities.
Reasoning
41 existing vulnerabilities detected
Project metadata as of .