- Updated Go version to 1.25.3 in go.mod and go.work to patch standard library vulnerabilities. - Explicitly required github.com/cloudflare/circl v1.6.1 in go.mod to resolve a transitive dependency vulnerability. - Created AUDIT-DEPENDENCIES.md to document the audit findings and remediation steps. Co-authored-by: Snider <631881+Snider@users.noreply.github.com>
1.8 KiB
1.8 KiB
Dependency Audit Report
Summary
A security audit of the project's dependencies was conducted to identify and remediate vulnerabilities. The audit revealed several vulnerabilities in both transitive dependencies and the Go standard library. All identified vulnerabilities have been successfully remediated.
Initial Findings
The initial scan using govulncheck identified the following vulnerabilities:
- GO-2025-3754: A vulnerability in the
github.com/cloudflare/circlpackage, which was included as a transitive dependency. - GO-2025-4011: A vulnerability in the
encoding/asn1package of the Go standard library. - GO-2025-4009: A vulnerability in the
encoding/pempackage of the Go standard library. - GO-2025-4007: A vulnerability in the
crypto/x509package of the Go standard library.
Remediation Steps
The following steps were taken to remediate the identified vulnerabilities:
- Updated
go.modto use Go 1.25.3: The Go version was updated from1.25to1.25.3to patch the vulnerabilities in the standard library. - Updated
go.workto use Go 1.25.3: Thego.workfile was synchronized with thego.modfile. - Explicitly required a patched version of
github.com/cloudflare/circl: Thego.modfile was updated to requiregithub.com/cloudflare/circl v1.6.1to resolve the transitive dependency vulnerability. - Ran
go mod tidy: The dependencies were tidied to ensure thego.sumfile was updated and all dependencies were consistent. - Ran tests: The test suite was run to ensure that the dependency updates did not introduce any regressions.
Final Status
A final vulnerability scan was conducted after the remediation steps were applied. The scan confirmed that all identified vulnerabilities have been successfully remediated, and the project's dependencies are now secure.