Go module
github.com/digitalocean/doctl
history
arrow_drop_downv1.81.0
Newer version availableSecurity Advisories
26
In the dependencies
Similar advisories
Moby (Docker Engine) started with non-empty inheritable Linux process capabilities
5.9 MODERATE·GHSA-2mm7-x5h6-5pvq
Similar advisories
Arbitrary File Override in Docker Engine
5.1 MODERATE·GHSA-v4h8-794j-g8mm
Similar advisories
Docker supplementary group permissions not set up properly, allowing attackers to bypass primary group restrictions
6.3 MODERATE·GHSA-rc4r-wh2q-q6c4
Similar advisories
Container build can leak any path on the host into the container
LOW·GHSA-vp35-85q5-9f25
Similar advisories
Opencontainers runc Incorrect Authorization vulnerability
7 HIGH·GHSA-vpvm-3wq2-2wvm
Similar advisories
rootless: `/sys/fs/cgroup` is writable when cgroupns isn't unshared in runc
2.5 LOW·GHSA-m8cg-xc2p-r3fc
Similar advisories
runc AppArmor bypass with symlinked /proc
6.1 MODERATE·GHSA-g2j6-57v7-gm8c
Similar advisories
Improper rendering of text nodes in golang.org/x/net/html
6.1 MODERATE·GHSA-2wrh-6pvc-2jm9
Similar advisories
HTTP/2 rapid reset can cause excessive work in net/http
7.5 HIGH·GHSA-4374-p667-p6c8
Similar advisories
Prefix Truncation Attack against ChaCha20-Poly1305 and Encrypt-then-MAC aka Terrapin
5.9 MODERATE·GHSA-45x7-px36-x8w8
Similar advisories
runc vulnerable to container breakout through process.cwd trickery and leaked fds
8.6 HIGH·GHSA-xr7r-f8xq-vfvv
Similar advisories
Moby (Docker Engine) Insufficiently restricted permissions on data directory
5.9 MODERATE·GHSA-3fwx-pjgw-3558
Similar advisories
Classic builder cache poisoning
6.9 MODERATE·GHSA-xw73-rw38-6vjc
Similar advisories
Golang protojson.Unmarshal function infinite loop when unmarshaling certain forms of invalid JSON
7.5 MODERATE·GHSA-8r3f-844c-mc37
Similar advisories
net/http, x/net/http2: close connections when receiving too many headers
5.3 MODERATE·GHSA-4v7x-pqxf-cx7m
Similar advisories
`docker cp` allows unexpected chmod of host files in Moby Docker Engine
2.8 LOW·GHSA-v994-f8vw-g7j4
Similar advisories
Moby (Docker Engine) is vulnerable to Ambiguous OCI manifest parsing
MODERATE·GHSA-xmmx-7jpf-fx42
Similar advisories
runc can be confused to create empty files/directories on the host
3.6 MODERATE·GHSA-jfvp-7x6p-h2pv
Similar advisories
Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
9.1 CRITICAL·GHSA-v778-237x-gjrc
Similar advisories
Non-linear parsing of case-insensitive content in golang.org/x/net/html
HIGH·GHSA-w32m-9786-jp63
/sys/devices/virtual/powercap accessible by default to containers
MODERATE·GHSA-jq35-85cj-fj4p
Moby's external DNS requests from 'internal' networks could lead to data exfiltration
5.9 MODERATE·GHSA-mq39-4gv4-mvpx
HTTP/2 Stream Cancellation Attack
5.3 MODERATE·GHSA-qppj-fm5r-hxr3
Dependents
This package has no known dependents.
Package metadata as of .
Links
- Origin
- Repo
Projects
digitalocean/doctl
GitHub
The official command line interface for the DigitalOcean API.
call_split 395 forks
star 3k stars
OpenSSF scorecard
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
View information about checks and how to fix failures.
Score
6.1/10
Scorecard as of .
Code-Review
10/10
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
Reasoning
all changesets reviewed
Dangerous-Workflow
10/10
Determines if the project's GitHub Action workflows avoid dangerous patterns.
Reasoning
no dangerous workflow patterns detected
Maintained
10/10
Determines if the project is "actively maintained".
Reasoning
30 commit(s) and 6 issue activity found in the last 90 days -- score normalized to 10
Token-Permissions
0/10
Determines if the project's workflows follow the principle of least privilege.
Reasoning
detected GitHub workflow tokens with excessive permissions
CII-Best-Practices
2/10
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Reasoning
badge detected: InProgress
License
10/10
Determines if the project has defined a license.
Reasoning
license file detected
Fuzzing
0/10
Determines if the project uses fuzzing.
Reasoning
project is not fuzzed
Binary-Artifacts
10/10
Determines if the project has generated executable (binary) artifacts in the source repository.
Reasoning
no binaries found in the repo
Security-Policy
10/10
Determines if the project has published a security policy.
Reasoning
security policy file detected
Signed-Releases
0/10
Determines if the project cryptographically signs release artifacts.
Reasoning
Project has not signed or included provenance with any releases.
Packaging
10/10
Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.
Reasoning
packaging workflow detected
Pinned-Dependencies
0/10
Determines if the project has declared and pinned the dependencies of its build process.
Reasoning
dependency not pinned by hash detected -- score normalized to 0
SAST
0/10
Determines if the project uses static code analysis.
Reasoning
SAST tool is not run on all commits -- score normalized to 0
Vulnerabilities
8/10
Determines if the project has open, known unfixed vulnerabilities.
Reasoning
2 existing vulnerabilities detected
Project metadata as of .