Go Security Vulnerability

PassAudited by ClawScan on May 10, 2026.

Overview

This is a coherent Go vulnerability-scanning and remediation skill, but users should review its system-level Go setup snippet and dependency-changing commands before running them.

Use this skill in a Go project where you are comfortable modifying dependencies. Install or update Go through a trusted method, review all dependency changes, and run the recommended build and test checks before accepting fixes.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If run, this could modify the local system Go installation or require elevated privileges.

Why it was flagged

The skill includes a setup script that downloads a remote Go archive and extracts it into a system directory. Installing Go is aligned with the skill purpose, but users should verify the source, platform, and need for privileged writes.

Skill content
"script": "curl -L https://golang.org/dl/go1.21.5.linux-amd64.tar.gz | tar -C /usr/local -xzf -"
Recommendation

Prefer installing Go through a trusted package manager or verify the official download and checksum before extracting into /usr/local.

What this means

Dependency updates may alter build behavior, introduce regressions, or change transitive packages.

Why it was flagged

The skill recommends commands that update dependencies and rewrite module files. This is expected for vulnerability remediation, but it can change application behavior.

Skill content
go get -u vulnerable/package@latest
go mod tidy
Recommendation

Review go.mod/go.sum diffs, run tests, and avoid broad updates unless they are needed for the specific vulnerability fix.