| ##### |
| # Test of govulncheck call analysis for vulns with no package info available. |
| # All symbols of the module are vulnerable. |
| $ govulncheck -C ${moddir}/wholemodvuln ./... --> FAIL 3 |
| Scanning your code and P packages across M dependent modules for known vulnerabilities... |
| |
| === Symbol Results === |
| |
| Vulnerability #1: GO-2022-0956 |
| Excessive resource consumption in gopkg.in/yaml.v2 |
| More info: https://pkg.go.dev/vuln/GO-2022-0956 |
| Module: gopkg.in/yaml.v2 |
| Found in: gopkg.in/yaml.v2@v2.2.3 |
| Fixed in: gopkg.in/yaml.v2@v2.2.4 |
| Example traces found: |
| #1: .../whole_mod_vuln.go:<l>:<c>: wholemodvuln.main calls yaml.Marshal |
| #2: .../whole_mod_vuln.go:<l>:<c>: wholemodvuln.init calls yaml.init |
| |
| Your code is affected by 1 vulnerability from 1 module. |
| This scan also found 0 vulnerabilities in packages you import and 1 |
| vulnerability in modules you require, but your code doesn't appear to call these |
| vulnerabilities. |
| Use '-show verbose' for more details. |