Skip to content

Commit ec3be36

Browse files
authored
chore: update impact metrics 2026-04-05 (#28)
- Updated vulnerability scan results - Refreshed CWE instance counts - Updated README badges
1 parent 45922c7 commit ec3be36

File tree

3 files changed

+1436
-32
lines changed

3 files changed

+1436
-32
lines changed

README.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,13 @@
1414

1515
| CWE | Vulnerability | Instances | Severity |
1616
|-----|--------------|-----------|----------|
17-
| ![CWE-502](https://img.shields.io/badge/CWE--502-187304-critical?style=flat-square) | Deserialization of Untrusted Data | **166240** | 🔴 CRITICAL |
18-
| ![CWE-79](https://img.shields.io/badge/CWE--79-52776-red?style=flat-square) | Cross-site Scripting (XSS) | **46156** | 🟠 HIGH |
19-
| ![CWE-89](https://img.shields.io/badge/CWE--89-65736-critical?style=flat-square) | SQL Injection | **54904** | 🔴 CRITICAL |
20-
| ![CWE-22](https://img.shields.io/badge/CWE--22-13348-red?style=flat-square) | Path Traversal | **46156** | 🟠 HIGH |
21-
| ![CWE-78](https://img.shields.io/badge/CWE--78-82764-critical?style=flat-square) | OS Command Injection | **69164** | 🔴 CRITICAL |
17+
| ![CWE-502](https://img.shields.io/badge/CWE--502-192940-critical?style=flat-square) | Deserialization of Untrusted Data | **166240** | 🔴 CRITICAL |
18+
| ![CWE-79](https://img.shields.io/badge/CWE--79-51840-red?style=flat-square) | Cross-site Scripting (XSS) | **46156** | 🟠 HIGH |
19+
| ![CWE-89](https://img.shields.io/badge/CWE--89-108144-critical?style=flat-square) | SQL Injection | **54904** | 🔴 CRITICAL |
20+
| ![CWE-22](https://img.shields.io/badge/CWE--22-14316-red?style=flat-square) | Path Traversal | **46156** | 🟠 HIGH |
21+
| ![CWE-78](https://img.shields.io/badge/CWE--78-81460-critical?style=flat-square) | OS Command Injection | **69164** | 🔴 CRITICAL |
2222

23-
**Total Impact:** ![Total Vulnerable](https://img.shields.io/badge/total_vulnerable-401928-critical?style=for-the-badge) ![Stars Affected](https://img.shields.io/badge/stars_affected-260537-blue?style=for-the-badge)
23+
**Total Impact:** ![Total Vulnerable](https://img.shields.io/badge/total_vulnerable-448700-critical?style=for-the-badge) ![Stars Affected](https://img.shields.io/badge/stars_affected-236095-blue?style=for-the-badge)
2424

2525
---
2626

metrics/REPORT.md

Lines changed: 26 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,61 +1,61 @@
11
# Go Ecosystem Vulnerability Impact Report
22

3-
**Generated:** 2026-03-29 00:39 UTC
3+
**Generated:** 2026-04-05 00:39 UTC
44
**Scanner:** [go-safeinput](https://github.com/ravisastryk/go-safeinput)
55
**Coverage:** MITRE CWE Top 25 vulnerabilities
66

77
## Executive Summary
88

99
| Metric | Value |
1010
|--------|-------|
11-
| **Total Vulnerable Instances** | **401928** |
12-
| Total Stars Affected | 260537 |
13-
| Total Forks Affected | 23978 |
11+
| **Total Vulnerable Instances** | **448700** |
12+
| Total Stars Affected | 236095 |
13+
| Total Forks Affected | 21475 |
1414
| CWEs Analyzed | 5 |
1515

1616
## Vulnerability Breakdown by CWE
1717

1818
| CWE | Vulnerability Type | Instances | Severity |
1919
|-----|-------------------|-----------|----------|
20-
| **CWE-502** | Deserialization of Untrusted Data | **187304** | CRITICAL |
21-
| **CWE-79** | Cross-site Scripting (XSS) | **52776** | HIGH |
22-
| **CWE-89** | SQL Injection | **65736** | CRITICAL |
23-
| **CWE-22** | Path Traversal | **13348** | HIGH |
24-
| **CWE-78** | OS Command Injection | **82764** | CRITICAL |
20+
| **CWE-502** | Deserialization of Untrusted Data | **192940** | CRITICAL |
21+
| **CWE-79** | Cross-site Scripting (XSS) | **51840** | HIGH |
22+
| **CWE-89** | SQL Injection | **108144** | CRITICAL |
23+
| **CWE-22** | Path Traversal | **14316** | HIGH |
24+
| **CWE-78** | OS Command Injection | **81460** | CRITICAL |
2525

2626
## Detailed Pattern Analysis
2727

2828
### CWE-502: Deserialization of Untrusted Data
2929

30-
- **CWE-502: JSON deserialization into interface{}**: 113152 instances
31-
- **CWE-502: YAML deserialization into interface{}**: 7908 instances
32-
- **CWE-502: JSON decoder into interface{}**: 55168 instances
33-
- **CWE-502: XML deserialization into interface{}**: 3808 instances
34-
- **CWE-502: Using yaml.v2 (vulnerable to custom tags)**: 7268 instances
30+
- **CWE-502: JSON deserialization into interface{}**: 116480 instances
31+
- **CWE-502: YAML deserialization into interface{}**: 7524 instances
32+
- **CWE-502: JSON decoder into interface{}**: 55936 instances
33+
- **CWE-502: XML deserialization into interface{}**: 3600 instances
34+
- **CWE-502: Using yaml.v2 (vulnerable to custom tags)**: 9400 instances
3535

3636
### CWE-79: Cross-site Scripting (XSS)
3737

38-
- **CWE-79: Potential XSS via HTML template rendering**: 13024 instances
39-
- **CWE-79: Direct write to ResponseWriter (potential XSS)**: 36992 instances
40-
- **CWE-79: Using template.JS (bypasses escaping)**: 2760 instances
38+
- **CWE-79: Potential XSS via HTML template rendering**: 12960 instances
39+
- **CWE-79: Direct write to ResponseWriter (potential XSS)**: 35712 instances
40+
- **CWE-79: Using template.JS (bypasses escaping)**: 3168 instances
4141

4242
### CWE-89: SQL Injection
4343

44-
- **CWE-89: SQL query with string concatenation**: 13128 instances
45-
- **CWE-89: SQL exec with string concatenation**: 29312 instances
46-
- **CWE-89: Raw SQL with string interpolation**: 23296 instances
44+
- **CWE-89: SQL query with string concatenation**: 10992 instances
45+
- **CWE-89: SQL exec with string concatenation**: 30208 instances
46+
- **CWE-89: Raw SQL with string interpolation**: 66944 instances
4747

4848
### CWE-22: Path Traversal
4949

50-
- **CWE-22: filepath.Join with user input**: 4272 instances
51-
- **CWE-22: os.Open with user-controlled path**: 996 instances
52-
- **CWE-22: File read with constructed path**: 8080 instances
50+
- **CWE-22: filepath.Join with user input**: 4192 instances
51+
- **CWE-22: os.Open with user-controlled path**: 1052 instances
52+
- **CWE-22: File read with constructed path**: 9072 instances
5353

5454
### CWE-78: OS Command Injection
5555

56-
- **CWE-78: exec.Command with user input**: 1036 instances
57-
- **CWE-78: exec.Command with string formatting**: 46144 instances
58-
- **CWE-78: Shell command execution**: 35584 instances
56+
- **CWE-78: exec.Command with user input**: 1012 instances
57+
- **CWE-78: exec.Command with string formatting**: 44992 instances
58+
- **CWE-78: Shell command execution**: 35456 instances
5959

6060
## Fix with go-safeinput
6161

0 commit comments

Comments
 (0)