| ##### |
| # Test of govulncheck call analysis for vulns with no package info available. |
| # All symbols of the module are vulnerable. |
| $ govulncheck -C ${moddir}/wholemodvuln ./... --> FAIL 3 |
| Scanning your code and P packages across M dependent modules for known vulnerabilities... |
| |
| === Symbol Results === |
| |
| Vulnerability #1: GO-2022-0956 |
| Excessive resource consumption in gopkg.in/yaml.v2 |
| More info: https://pkg.go.dev/vuln/GO-2022-0956 |
| Module: gopkg.in/yaml.v2 |
| Found in: gopkg.in/yaml.v2@v2.2.3 |
| Fixed in: gopkg.in/yaml.v2@v2.2.4 |
| Example traces found: |
| #1: whole_mod_vuln.go:8:21: wholemodvuln.main calls yaml.Marshal |
| #2: whole_mod_vuln.go:4:2: wholemodvuln.init calls yaml.init |
| |
| Your code is affected by 1 vulnerability from 1 module. |
| This scan found no other vulnerabilities in packages you import or modules you |
| require. |
| Use '-show verbose' for more details. |