Go module
google.golang.org/grpc
history
arrow_drop_downv1.30.0-dev.1.0.20200604175613-ad51f572fd27
Newer version availableSecurity Advisories
19
In this package
Similar advisories
HTTP/2 Stream Cancellation Attack
5.3 MODERATE·GHSA-qppj-fm5r-hxr3
gRPC-Go HTTP/2 Rapid Reset vulnerability
7.5 HIGH·GHSA-m425-mq94-257g
In the dependencies
Similar advisories
golang.org/x/net/http vulnerable to ping floods
7.5 HIGH·GHSA-hgr8-6h9x-f7q9
golang.org/x/net/http vulnerable to a reset flood
7.5 HIGH·GHSA-39qc-96h7-956f
Similar advisories
golang.org/x/text Infinite loop
7.5 MODERATE·GHSA-5rcv-m4m3-hfh7
Similar advisories
golang.org/x/text/language Out-of-bounds Read vulnerability
7.5 HIGH·GHSA-ppp9-7jff-5vj2
Similar advisories
golang.org/x/net/html Infinite Loop vulnerability
7.5 HIGH·GHSA-83g2-8m93-v3w7
Similar advisories
golang.org/x/net/http/httpguts vulnerable to Uncontrolled Recursion
5.9 MODERATE·GHSA-h86h-8ppg-mxmh
Similar advisories
golang.org/x/sys/unix has Incorrect privilege reporting in syscall
5.3 MODERATE·GHSA-p782-xgp4-8hr8
Similar advisories
golang.org/x/net/http2 Denial of Service vulnerability
7.5 HIGH·GHSA-69cg-p879-7622
Similar advisories
golang.org/x/text/language Denial of service via crafted Accept-Language header
7.5 HIGH·GHSA-69ch-w2m2-3vjp
Similar advisories
golang.org/x/net/http2 vulnerable to possible excessive memory growth
5.3 MODERATE·GHSA-xrjj-mj9h-534m
Similar advisories
golang.org/x/net vulnerable to Uncontrolled Resource Consumption
7.5 HIGH·GHSA-vvpx-j8f3-3w6h
Similar advisories
Improper rendering of text nodes in golang.org/x/net/html
6.1 MODERATE·GHSA-2wrh-6pvc-2jm9
Similar advisories
HTTP/2 rapid reset can cause excessive work in net/http
7.5 HIGH·GHSA-4374-p667-p6c8
Similar advisories
net/http, x/net/http2: close connections when receiving too many headers
5.3 MODERATE·GHSA-4v7x-pqxf-cx7m
Similar advisories
Insecure Temporary File usage in github.com/golang/glog
7.1 MODERATE·GHSA-6wxm-mpqj-6jpf
Similar advisories
HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
4.4 MODERATE·GHSA-qxp5-gwg8-xv66
HTTP/2 Stream Cancellation Attack
5.3 MODERATE·GHSA-qppj-fm5r-hxr3
Dependents
This package has no known dependents.
Package metadata as of .
Published
Links
- Origin
- Repo
Projects
grpc/grpc-go
GitHub
The Go language implementation of gRPC. HTTP/2 based RPC
call_split 4k forks
star 22k stars
OpenSSF scorecard
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
View information about checks and how to fix failures.
Score
8.3/10
Scorecard as of .
Code-Review
10/10
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
Reasoning
all changesets reviewed
Maintained
10/10
Determines if the project is "actively maintained".
Reasoning
30 commit(s) and 12 issue activity found in the last 90 days -- score normalized to 10
Security-Policy
9/10
Determines if the project has published a security policy.
Reasoning
security policy file detected
Dangerous-Workflow
10/10
Determines if the project's GitHub Action workflows avoid dangerous patterns.
Reasoning
no dangerous workflow patterns detected
CII-Best-Practices
0/10
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Reasoning
no effort to earn an OpenSSF best practices badge detected
Token-Permissions
10/10
Determines if the project's workflows follow the principle of least privilege.
Reasoning
GitHub workflow tokens follow principle of least privilege
License
10/10
Determines if the project has defined a license.
Reasoning
license file detected
Binary-Artifacts
10/10
Determines if the project has generated executable (binary) artifacts in the source repository.
Reasoning
no binaries found in the repo
Fuzzing
10/10
Determines if the project uses fuzzing.
Reasoning
project is fuzzed
Pinned-Dependencies
0/10
Determines if the project has declared and pinned the dependencies of its build process.
Reasoning
dependency not pinned by hash detected -- score normalized to 0
SAST
7/10
Determines if the project uses static code analysis.
Reasoning
SAST tool detected but not run on all commits
Vulnerabilities
6/10
Determines if the project has open, known unfixed vulnerabilities.
Reasoning
4 existing vulnerabilities detected
Project metadata as of .