|
1 | 1 | # Go Ecosystem Vulnerability Impact Report |
2 | 2 |
|
3 | | -**Generated:** 2026-03-29 00:39 UTC |
| 3 | +**Generated:** 2026-04-05 00:39 UTC |
4 | 4 | **Scanner:** [go-safeinput](https://github.com/ravisastryk/go-safeinput) |
5 | 5 | **Coverage:** MITRE CWE Top 25 vulnerabilities |
6 | 6 |
|
7 | 7 | ## Executive Summary |
8 | 8 |
|
9 | 9 | | Metric | Value | |
10 | 10 | |--------|-------| |
11 | | -| **Total Vulnerable Instances** | **401928** | |
12 | | -| Total Stars Affected | 260537 | |
13 | | -| Total Forks Affected | 23978 | |
| 11 | +| **Total Vulnerable Instances** | **448700** | |
| 12 | +| Total Stars Affected | 236095 | |
| 13 | +| Total Forks Affected | 21475 | |
14 | 14 | | CWEs Analyzed | 5 | |
15 | 15 |
|
16 | 16 | ## Vulnerability Breakdown by CWE |
17 | 17 |
|
18 | 18 | | CWE | Vulnerability Type | Instances | Severity | |
19 | 19 | |-----|-------------------|-----------|----------| |
20 | | -| **CWE-502** | Deserialization of Untrusted Data | **187304** | CRITICAL | |
21 | | -| **CWE-79** | Cross-site Scripting (XSS) | **52776** | HIGH | |
22 | | -| **CWE-89** | SQL Injection | **65736** | CRITICAL | |
23 | | -| **CWE-22** | Path Traversal | **13348** | HIGH | |
24 | | -| **CWE-78** | OS Command Injection | **82764** | CRITICAL | |
| 20 | +| **CWE-502** | Deserialization of Untrusted Data | **192940** | CRITICAL | |
| 21 | +| **CWE-79** | Cross-site Scripting (XSS) | **51840** | HIGH | |
| 22 | +| **CWE-89** | SQL Injection | **108144** | CRITICAL | |
| 23 | +| **CWE-22** | Path Traversal | **14316** | HIGH | |
| 24 | +| **CWE-78** | OS Command Injection | **81460** | CRITICAL | |
25 | 25 |
|
26 | 26 | ## Detailed Pattern Analysis |
27 | 27 |
|
28 | 28 | ### CWE-502: Deserialization of Untrusted Data |
29 | 29 |
|
30 | | -- **CWE-502: JSON deserialization into interface{}**: 113152 instances |
31 | | -- **CWE-502: YAML deserialization into interface{}**: 7908 instances |
32 | | -- **CWE-502: JSON decoder into interface{}**: 55168 instances |
33 | | -- **CWE-502: XML deserialization into interface{}**: 3808 instances |
34 | | -- **CWE-502: Using yaml.v2 (vulnerable to custom tags)**: 7268 instances |
| 30 | +- **CWE-502: JSON deserialization into interface{}**: 116480 instances |
| 31 | +- **CWE-502: YAML deserialization into interface{}**: 7524 instances |
| 32 | +- **CWE-502: JSON decoder into interface{}**: 55936 instances |
| 33 | +- **CWE-502: XML deserialization into interface{}**: 3600 instances |
| 34 | +- **CWE-502: Using yaml.v2 (vulnerable to custom tags)**: 9400 instances |
35 | 35 |
|
36 | 36 | ### CWE-79: Cross-site Scripting (XSS) |
37 | 37 |
|
38 | | -- **CWE-79: Potential XSS via HTML template rendering**: 13024 instances |
39 | | -- **CWE-79: Direct write to ResponseWriter (potential XSS)**: 36992 instances |
40 | | -- **CWE-79: Using template.JS (bypasses escaping)**: 2760 instances |
| 38 | +- **CWE-79: Potential XSS via HTML template rendering**: 12960 instances |
| 39 | +- **CWE-79: Direct write to ResponseWriter (potential XSS)**: 35712 instances |
| 40 | +- **CWE-79: Using template.JS (bypasses escaping)**: 3168 instances |
41 | 41 |
|
42 | 42 | ### CWE-89: SQL Injection |
43 | 43 |
|
44 | | -- **CWE-89: SQL query with string concatenation**: 13128 instances |
45 | | -- **CWE-89: SQL exec with string concatenation**: 29312 instances |
46 | | -- **CWE-89: Raw SQL with string interpolation**: 23296 instances |
| 44 | +- **CWE-89: SQL query with string concatenation**: 10992 instances |
| 45 | +- **CWE-89: SQL exec with string concatenation**: 30208 instances |
| 46 | +- **CWE-89: Raw SQL with string interpolation**: 66944 instances |
47 | 47 |
|
48 | 48 | ### CWE-22: Path Traversal |
49 | 49 |
|
50 | | -- **CWE-22: filepath.Join with user input**: 4272 instances |
51 | | -- **CWE-22: os.Open with user-controlled path**: 996 instances |
52 | | -- **CWE-22: File read with constructed path**: 8080 instances |
| 50 | +- **CWE-22: filepath.Join with user input**: 4192 instances |
| 51 | +- **CWE-22: os.Open with user-controlled path**: 1052 instances |
| 52 | +- **CWE-22: File read with constructed path**: 9072 instances |
53 | 53 |
|
54 | 54 | ### CWE-78: OS Command Injection |
55 | 55 |
|
56 | | -- **CWE-78: exec.Command with user input**: 1036 instances |
57 | | -- **CWE-78: exec.Command with string formatting**: 46144 instances |
58 | | -- **CWE-78: Shell command execution**: 35584 instances |
| 56 | +- **CWE-78: exec.Command with user input**: 1012 instances |
| 57 | +- **CWE-78: exec.Command with string formatting**: 44992 instances |
| 58 | +- **CWE-78: Shell command execution**: 35456 instances |
59 | 59 |
|
60 | 60 | ## Fix with go-safeinput |
61 | 61 |
|
|
0 commit comments