MyNixOS website logo
Description

Database client and tools for the Go vulnerability database, also known as vuln.

Govulncheck reports known vulnerabilities that affect Go code. It uses static analysis of source code or a binary's symbol table to narrow down reports to only those that could affect the application.

By default, govulncheck makes requests to the Go vulnerability database at https://vuln.go.dev. Requests to the vulnerability database contain only module paths, not code or other properties of your program. See https://vuln.go.dev/privacy.html for more. Set the GOVULNDB environment variable to specify a different database, which must implement the specification at https://go.dev/security/vuln/database.

Govulncheck looks for vulnerabilities in Go programs using a specific build configuration. For analyzing source code, that configuration is the operating system, architecture, and Go version specified by GOOS, GOARCH, and the “go” command found on the PATH. For binaries, the build configuration is the one used to build the binary. Note that different build configurations may have different known vulnerabilities. For example, a dependency with a Windows-specific vulnerability will not be reported for a Linux build.

Metadata

Version

1.1.3

Maintainers (2)

Executables (1)

  • bin/govulncheck

Platforms (29)

    Darwin
    FreeBSD
    Linux
    WASI
Show all
  • aarch64-darwin
  • aarch64-linux
  • armv5tel-linux
  • armv6l-linux
  • armv7a-darwin
  • armv7a-linux
  • armv7l-linux
  • i686-darwin
  • i686-freebsd
  • i686-linux
  • loongarch64-linux
  • m68k-linux
  • microblaze-linux
  • microblazeel-linux
  • mips-linux
  • mips64-linux
  • mips64el-linux
  • mipsel-linux
  • powerpc64-linux
  • powerpc64le-linux
  • riscv32-linux
  • riscv64-linux
  • s390-linux
  • s390x-linux
  • wasm32-wasi
  • wasm64-wasi
  • x86_64-darwin
  • x86_64-freebsd
  • x86_64-linux