Go module
github.com/xiaomingloveqinger/elastos.ela
history
arrow_drop_downv0.3.6
Newer version availablewarning
Warning
We found errors while resolving dependencies that may result in an incomplete or inaccurate dependency graph.
Show details
- could not find module for package import: github.com/elastos/elastos.ela/dpos/store
- Errors found while resolving some dependencies. Please go to the Dependencies tab for more information.
Security Advisories
4
In the dependencies
Similar advisories
btcd mishandles witness size checking
9.8 CRITICAL·GHSA-2chg-86hq-7w38
Similar advisories
btcd susceptible to consensus failures
MODERATE·GHSA-3jgf-r68h-xfqm
Similar advisories
btcd did not correctly re-implement Bitcoin Core's "FindAndDelete()" functionality
7.4 HIGH·GHSA-27vh-h6mc-q6g8
Similar advisories
Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
9.1 CRITICAL·GHSA-v778-237x-gjrc
Dependents
This package has no known dependents.
Package metadata as of .
Links
- Origin
- Repo
Projects
xiaomingloveqinger/elastos.ela
GitHub
Crypto Token
call_split 0 forks
star 0 stars
OpenSSF scorecard
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
View information about checks and how to fix failures.
Score
2.5/10
Scorecard as of .
Dangerous-Workflow
10/10
Determines if the project's GitHub Action workflows avoid dangerous patterns.
Reasoning
no dangerous workflow patterns detected
Maintained
0/10
Determines if the project is "actively maintained".
Reasoning
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Token-Permissions
0/10
Determines if the project's workflows follow the principle of least privilege.
Reasoning
detected GitHub workflow tokens with excessive permissions
Code-Review
0/10
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
Reasoning
Found 0/30 approved changesets -- score normalized to 0
SAST
0/10
Determines if the project uses static code analysis.
Reasoning
no SAST tool detected
CII-Best-Practices
0/10
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Reasoning
no effort to earn an OpenSSF best practices badge detected
Binary-Artifacts
10/10
Determines if the project has generated executable (binary) artifacts in the source repository.
Reasoning
no binaries found in the repo
Security-Policy
0/10
Determines if the project has published a security policy.
Reasoning
security policy file not detected
Fuzzing
0/10
Determines if the project uses fuzzing.
Reasoning
project is not fuzzed
License
9/10
Determines if the project has defined a license.
Reasoning
license file detected
Branch-Protection
0/10
Determines if the default and release branches are protected with GitHub's branch protection settings.
Reasoning
branch protection not enabled on development/release branches
Pinned-Dependencies
1/10
Determines if the project has declared and pinned the dependencies of its build process.
Reasoning
dependency not pinned by hash detected -- score normalized to 1
Vulnerabilities
0/10
Determines if the project has open, known unfixed vulnerabilities.
Reasoning
13 existing vulnerabilities detected
Project metadata as of .