Skip to main content
Skip table of contents

Go

This article covers Go support and vulnerability detection for Mend SAST.

Mend SAST-supported Go file types

**Note: These extensions are marked as ‘Secondary’ file extensions.
They will only be scanned if at least one file with any of the other ‘Primary’ file extensions is present to identify the language as the relevant language.

File Type

.go

.golan**

Mend SAST-supported Go frameworks

Framework

Beego

Echo

Gin

Gorilla

Revel

Mend SAST-supported Go vulnerability types

The Go vulnerability types detected by SAST are provided below and are organized by CWE ID within each of their identified severities.

Go high-severity vulnerability types

CWE

Vulnerability Type

CWE-22

Path/Directory Traversal

CWE-73

File Manipulation

CWE-78

Command Injection

CWE-79

Cross-Site Scripting

CWE-89

SQL Injection

CWE-643

XPath Injection

CWE-732

Insecure File Permissions

CWE-732

Insecure Directory Permissions

CWE-918

Server-Side Request Forgery

Go medium-severity vulnerability types

CWE

Vulnerability Type

CWE-90

LDAP Injection

CWE-244

Heap Inspection

CWE-295

Insecure TLS Configuration

CWE-322

Insecure SSH Configuration

CWE-338

Weak Pseudo-Random

CWE-377

Tempfile Predictable Path

CWE-400

Sleep Denial of Service

CWE-472

Hidden HTML Input

CWE-676

Miscellaneous Dangerous Functions

CWE-798

Hardcoded Password/Credentials

CWE-1327

Insecure Interface Binding

Go low-severity vulnerability types

CWE

Vulnerability Type

CWE-20

Cookie Injection

CWE-113

HTTP Header Injection

CWE-117

Log Forging

CWE-326

Weak Encryption Strength

CWE-434

File Upload

CWE-601

Unvalidated/Open Redirect

CWE-916

Weak Hash Strength

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.