Vulnerable Code
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/embedded/extract.go#L6-L11
1 Data Flow/s detected
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/embedded/extract.go#L11
Secure Code Warrior Training Material
Vulnerable Code
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/release-scripts/write-ls-protocol-version.py#L14
Secure Code Warrior Training Material
Vulnerable Code
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/release-scripts/write-ls-protocol-version.py#L21
Secure Code Warrior Training Material
Vulnerable Code
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/proxy/proxy.go#L44
Secure Code Warrior Training Material
Vulnerable Code
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/proxy/proxy.go#L38
Secure Code Warrior Training Material
Code Security Report
Scan Metadata
Latest Scan: 2024-09-25 02:35pm Total Findings: 8 | New Findings: 0 | Resolved Findings: 0 Tested Project Files: 377 Detected Programming Languages: 3 (JavaScript / TypeScript*, Go, Python)
Finding Details
Vulnerable Code
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/embedded/extract.go#L6-L111 Data Flow/s detected
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/embedded/extract.go#L11Secure Code Warrior Training Material
Vulnerable Code
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L4-L93 Data Flow/s detected
View Data Flow 1
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L15 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L46 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L8 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L9View Data Flow 2
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L15 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L45 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L8 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L9View Data Flow 3
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L15 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L44 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L8 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L9Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Path/Directory Traversal Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/pathtraversal/go/vanilla) ● Videos ▪ [Secure Code Warrior Path/Directory Traversal Video](https://media.securecodewarrior.com/v2/module_196_path_traversal.mp4) ● Further Reading ▪ [OWASP Path Traversal](https://owasp.org/www-community/attacks/Path_Traversal) ▪ [OWASP Input Validation Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html)Vulnerable Code
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L12-L174 Data Flow/s detected
View Data Flow 1
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L15 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L32 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L38 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L8 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L17View Data Flow 2
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L15 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L32 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L38 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L41 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L8 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L17View Data Flow 3
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L19 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L23 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L32 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/cmd/make-cert/main.go#L38 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L8 https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/utils/file.go#L17Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior File Manipulation Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/pathtraversal/go/vanilla) ● Videos ▪ [Secure Code Warrior File Manipulation Video](https://media.securecodewarrior.com/v2/module_196_path_traversal.mp4) ● Further Reading ▪ [OWASP Path Traversal](https://owasp.org/www-community/attacks/Path_Traversal) ▪ [OWASP Input Validation Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html)Vulnerable Code
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/release-scripts/write-ls-protocol-version.py#L52-L571 Data Flow/s detected
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/release-scripts/write-ls-protocol-version.py#L57Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Path/Directory Traversal Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/pathtraversal/python/vanilla) ● Videos ▪ [Secure Code Warrior Path/Directory Traversal Video](https://media.securecodewarrior.com/v2/module_196_path_traversal.mp4) ● Further Reading ▪ [OWASP Path Traversal](https://owasp.org/www-community/attacks/Path_Traversal) ▪ [OWASP Input Validation Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html)Vulnerable Code
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/release-scripts/write-ls-protocol-version.py#L14Secure Code Warrior Training Material
Vulnerable Code
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/release-scripts/write-ls-protocol-version.py#L21Secure Code Warrior Training Material
Vulnerable Code
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/proxy/proxy.go#L44Secure Code Warrior Training Material
Vulnerable Code
https://github.com/jgeraigery/snyk-cli/blob/7ce870ddc14825255cc25397a27f4c9ca67a72c8/cliv2/internal/proxy/proxy.go#L38Secure Code Warrior Training Material