You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The go generate command does not conduct security check. When compiling the associated malicious library and code, it may cause the execution of the "//go:generate [malicious command]"
Attack scenario:
People who provide golang open source libraries and projects may embed malicious commands, causing users to trigger commands during compilatio
The text was updated successfully, but these errors were encountered:
@go101 I know,But in the whole ecology, there are risks
There are too many open sources and complex dependencies. Think carefully about the supply chain attacks that are extremely feared
The go generate command does not conduct security check.
This is an impossible task for go generate.
Do you mean the docs of go generate should mention the risk in a more obvious manner?
Currently, the docs says
Generate runs commands described by directives within existing
files. Those commands can run any process but the intent is to
create or update Go source files.
Go generate is never run automatically by go build, go test,
and so on. It must be run explicitly.
The go generate command does not conduct security check. When compiling the associated malicious library and code, it may cause the execution of the "//go:generate [malicious command]"
Impact
1、hacker run
2、POC
3、run build
4、test command execution
Attack scenario:
People who provide golang open source libraries and projects may embed malicious commands, causing users to trigger commands during compilatio
The text was updated successfully, but these errors were encountered: