Go module
tailscale.com
check_circle
arrow_drop_downv1.78.3
Default versionwarning
Warning
We found errors while resolving dependencies that may result in an incomplete or inaccurate dependency graph.
Show details
- could not find module for package import: github.com/tailscale/golang-x-crypto/acme
- could not find module for package import: github.com/tailscale/golang-x-crypto/ssh
- could not find module for package import: github.com/tailscale/wireguard-go/conn
- could not find module for package import: github.com/tailscale/wireguard-go/device
- could not find module for package import: github.com/tailscale/wireguard-go/tun
- could not find module for package import: github.com/tailscale/wireguard-go/tun/tuntest
- could not find module for package import: github.com/tailscale/xnet/webdav
- could not find module for package import: software.sslmate.com/src/go-pkcs12
- Errors found while resolving some dependencies. Please go to the Dependencies tab for more information.
Security Advisories
5
In the dependencies
Similar advisories
Go JOSE vulnerable to Improper Handling of Highly Compressed Data (Data Amplification)
4.3 MODERATE·GHSA-c5q2-7r4c-mv6g
Similar advisories
Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
9.1 CRITICAL·GHSA-v778-237x-gjrc
Similar advisories
Non-linear parsing of case-insensitive content in golang.org/x/net/html
HIGH·GHSA-w32m-9786-jp63
Similar advisories
go-git clients vulnerable to DoS via maliciously crafted Git server replies
7.5 HIGH·GHSA-r9px-m959-cxf4
Similar advisories
go-git has an Argument Injection via the URL field
9.8 CRITICAL·GHSA-v725-9546-7q7m
Published
Projects
tailscale/tailscale
GitHub
The easiest, most secure way to use WireGuard and 2FA.
call_split 2k forks
star 20k stars
OpenSSF scorecard
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
View information about checks and how to fix failures.
Score
6.9/10
Scorecard as of .
Code-Review
10/10
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
Reasoning
all changesets reviewed
Maintained
10/10
Determines if the project is "actively maintained".
Reasoning
30 commit(s) and 3 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow
10/10
Determines if the project's GitHub Action workflows avoid dangerous patterns.
Reasoning
no dangerous workflow patterns detected
Security-Policy
10/10
Determines if the project has published a security policy.
Reasoning
security policy file detected
CII-Best-Practices
0/10
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Reasoning
no effort to earn an OpenSSF best practices badge detected
Token-Permissions
0/10
Determines if the project's workflows follow the principle of least privilege.
Reasoning
detected GitHub workflow tokens with excessive permissions
License
10/10
Determines if the project has defined a license.
Reasoning
license file detected
Binary-Artifacts
7/10
Determines if the project has generated executable (binary) artifacts in the source repository.
Reasoning
binaries present in source code
Fuzzing
10/10
Determines if the project uses fuzzing.
Reasoning
project is fuzzed
Pinned-Dependencies
5/10
Determines if the project has declared and pinned the dependencies of its build process.
Reasoning
dependency not pinned by hash detected -- score normalized to 5
SAST
10/10
Determines if the project uses static code analysis.
Reasoning
SAST tool is run on all commits
Vulnerabilities
0/10
Determines if the project has open, known unfixed vulnerabilities.
Reasoning
11 existing vulnerabilities detected
Project metadata as of .