Go module

github.com/coveo/gotemplate

v2.5.0+incompatible

Newer version available
Warning
The module by this name does not have a go.mod file, but there is a module in the same repository that does: github.com/coveo/gotemplate/v3 is probably what you are looking for.

Security Advisories

No advisories detected.

Dependents

5
  • Direct5
  • Indirect0

View dependents

Analysis

Capabilities

Learn more about capability analysis results.

No capability analysis results.

Package metadata as of .

Projects

coveooss/gotemplate

GitHub

Apply go template over files ending with .template in the current directory

 11 forks
 68 stars

OpenSSF scorecard

The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.

View information about checks and how to fix failures.

Score
6.2/10
Scorecard as of .
Maintained
10/10
Determines if the project is "actively maintained".
Reasoning
26 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow
10/10
Determines if the project's GitHub Action workflows avoid dangerous patterns.
Reasoning
no dangerous workflow patterns detected
Code-Review
10/10
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
Reasoning
all changesets reviewed
Binary-Artifacts
10/10
Determines if the project has generated executable (binary) artifacts in the source repository.
Reasoning
no binaries found in the repo
Token-Permissions
0/10
Determines if the project's workflows follow the principle of least privilege.
Reasoning
detected GitHub workflow tokens with excessive permissions
CII-Best-Practices
0/10
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Reasoning
no effort to earn an OpenSSF best practices badge detected
Pinned-Dependencies
2/10
Determines if the project has declared and pinned the dependencies of its build process.
Reasoning
dependency not pinned by hash detected -- score normalized to 2
Security-Policy
0/10
Determines if the project has published a security policy.
Reasoning
security policy file not detected
Fuzzing
0/10
Determines if the project uses fuzzing.
Reasoning
project is not fuzzed
License
10/10
Determines if the project has defined a license.
Reasoning
license file detected
Signed-Releases
0/10
Determines if the project cryptographically signs release artifacts.
Reasoning
Project has not signed or included provenance with any releases.
Packaging
10/10
Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.
Reasoning
packaging workflow detected
Vulnerabilities
9/10
Determines if the project has open, known unfixed vulnerabilities.
Reasoning
1 existing vulnerabilities detected
SAST
10/10
Determines if the project uses static code analysis.
Reasoning
SAST tool is run on all commits

Project metadata as of .