Go module
github.com/DataDog/datadog-agent/pkg/proto
history
arrow_drop_downv0.47.0
Newer version availableSecurity Advisories
6
In the dependencies
Similar advisories
HTTP/2 Stream Cancellation Attack
5.3 MODERATE·GHSA-qppj-fm5r-hxr3
gRPC-Go HTTP/2 Rapid Reset vulnerability
7.5 HIGH·GHSA-m425-mq94-257g
Similar advisories
Improper rendering of text nodes in golang.org/x/net/html
6.1 MODERATE·GHSA-2wrh-6pvc-2jm9
Similar advisories
HTTP/2 rapid reset can cause excessive work in net/http
7.5 HIGH·GHSA-4374-p667-p6c8
Similar advisories
Golang protojson.Unmarshal function infinite loop when unmarshaling certain forms of invalid JSON
7.5 MODERATE·GHSA-8r3f-844c-mc37
Similar advisories
net/http, x/net/http2: close connections when receiving too many headers
5.3 MODERATE·GHSA-4v7x-pqxf-cx7m
Similar advisories
Non-linear parsing of case-insensitive content in golang.org/x/net/html
HIGH·GHSA-w32m-9786-jp63
Dependents
This package has no known dependents.
Package metadata as of .
Published
Links
- Origin
- Repo
Projects
DataDog/datadog-agent
GitHub
Main repository for Datadog Agent
call_split 1k forks
star 3k stars
OpenSSF scorecard
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
View information about checks and how to fix failures.
Score
6.8/10
Scorecard as of .
Maintained
10/10
Determines if the project is "actively maintained".
Reasoning
30 commit(s) and 7 issue activity found in the last 90 days -- score normalized to 10
Code-Review
10/10
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
Reasoning
all changesets reviewed
CII-Best-Practices
0/10
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Reasoning
no effort to earn an OpenSSF best practices badge detected
Dangerous-Workflow
10/10
Determines if the project's GitHub Action workflows avoid dangerous patterns.
Reasoning
no dangerous workflow patterns detected
Security-Policy
0/10
Determines if the project has published a security policy.
Reasoning
security policy file not detected
Token-Permissions
8/10
Determines if the project's workflows follow the principle of least privilege.
Reasoning
detected GitHub workflow tokens with excessive permissions
License
10/10
Determines if the project has defined a license.
Reasoning
license file detected
Fuzzing
10/10
Determines if the project uses fuzzing.
Reasoning
project is fuzzed
Branch-Protection
5/10
Determines if the default and release branches are protected with GitHub's branch protection settings.
Reasoning
branch protection is not maximal on development and all release branches
Binary-Artifacts
8/10
Determines if the project has generated executable (binary) artifacts in the source repository.
Reasoning
binaries present in source code
Pinned-Dependencies
3/10
Determines if the project has declared and pinned the dependencies of its build process.
Reasoning
dependency not pinned by hash detected -- score normalized to 3
SAST
9/10
Determines if the project uses static code analysis.
Reasoning
SAST tool detected but not run on all commits
Vulnerabilities
0/10
Determines if the project has open, known unfixed vulnerabilities.
Reasoning
21 existing vulnerabilities detected
Project metadata as of .