Home / Vulnerability Database / Go : unsafe package usage
Go

Go : unsafe package usage

Classification

PCI DSS 4.0

Overview

The application uses the unsafe package. Incorrect work with memory and problems with portability of the application is possible.

In Go, there are built-in mechanisms for safe work with memory: pointers can not point to arbitrary memory, and buffer overruns result in crashes, not security exploits. The unsafe package allows programmers to bypass some of Go protection mechanisms.

In addition, according to the documentation, packages that import unsafe may be non-portable and are not protected by the Go 1 compatibility guidelines.

LOW

DerScanner Severity Score

Do you want to fix Go : unsafe package usage in your application?

See also

Go

Go : Undocumented feature: special account

Go

Go : Nil salt

Go

Go : Logging into system output