Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Jun 2, 2025

This PR contains the following updates:

Package Change Age Confidence
github.com/gin-gonic/gin v1.10.0 -> v1.11.0 age confidence

Release Notes

gin-gonic/gin (github.com/gin-gonic/gin)

v1.11.0

Compare Source

Features
  • feat(gin): Experimental support for HTTP/3 using quic-go/quic-go (#​3210)
  • feat(form): add array collection format in form binding (#​3986), add custom string slice for form tag unmarshal (#​3970)
  • feat(binding): add BindPlain (#​3904)
  • feat(fs): Export, test and document OnlyFilesFS (#​3939)
  • feat(binding): add support for unixMilli and unixMicro (#​4190)
  • feat(form): Support default values for collections in form binding (#​4048)
  • feat(context): GetXxx added support for more go native types (#​3633)
Enhancements
  • perf(context): optimize getMapFromFormData performance (#​4339)
  • refactor(tree): replace string(/) with "/" in node.insertChild (#​4354)
  • refactor(render): remove headers parameter from writeHeader (#​4353)
  • refactor(context): simplify "GetType()" functions (#​4080)
  • refactor(slice): simplify SliceValidationError Error method (#​3910)
  • refactor(context):Avoid using filepath.Dir twice in SaveUploadedFile (#​4181)
  • refactor(context): refactor context handling and improve test robustness (#​4066)
  • refactor(binding): use strings.Cut to replace strings.Index (#​3522)
  • refactor(context): add an optional permission parameter to SaveUploadedFile (#​4068)
  • refactor(context): verify URL is Non-nil in initQueryCache() (#​3969)
  • refactor(context): YAML judgment logic in Negotiate (#​3966)
  • tree: replace the self-defined 'min' to official one (#​3975)
  • context: Remove redundant filepath.Dir usage (#​4181)
Bug Fixes
  • fix: prevent middleware re-entry issue in HandleContext (#​3987)
  • fix(binding): prevent duplicate decoding and add validation in decodeToml (#​4193)
  • fix(gin): Do not panic when handling method not allowed on empty tree (#​4003)
  • fix(gin): data race warning for gin mode (#​1580)
  • fix(context): verify URL is Non-nil in initQueryCache() (#​3969)
  • fix(context): YAML judgment logic in Negotiate (#​3966)
  • fix(context): check handler is nil (#​3413)
  • fix(readme): fix broken link to English documentation (#​4222)
  • fix(tree): Keep panic infos consistent when wildcard type build faild (#​4077)
Build process updates / CI
  • ci: integrate Trivy vulnerability scanning into CI workflow (#​4359)
  • ci: support Go 1.25 in CI/CD (#​4341)
  • build(deps): upgrade github.com/bytedance/sonic from v1.13.2 to v1.14.0 (#​4342)
  • ci: add Go version 1.24 to GitHub Actions (#​4154)
  • build: update Gin minimum Go version to 1.21 (#​3960)
  • ci(lint): enable new linters (testifylint, usestdlibvars, perfsprint, etc.) (#​4010, #​4091, #​4090)
  • ci(lint): update workflows and improve test request consistency (#​4126)
Dependency updates
  • chore(deps): bump google.golang.org/protobuf from 1.36.6 to 1.36.9 (#​4346, #​4356)
  • chore(deps): bump github.com/stretchr/testify from 1.10.0 to 1.11.1 (#​4347)
  • chore(deps): bump actions/setup-go from 5 to 6 (#​4351)
  • chore(deps): bump github.com/quic-go/quic-go from 0.53.0 to 0.54.0 (#​4328)
  • chore(deps): bump golang.org/x/net from 0.33.0 to 0.38.0 (#​4178, #​4221)
  • chore(deps): bump github.com/go-playground/validator/v10 from 10.20.0 to 10.22.1 (#​4052)
Documentation updates
  • docs(changelog): update release notes for Gin v1.10.1 (#​4360)
  • docs: Fixing English grammar mistakes and awkward sentence structure in doc/doc.md (#​4207)
  • docs: update documentation and release notes for Gin v1.10.0 (#​3953)
  • docs: fix typo in Gin Quick Start (#​3997)
  • docs: fix comment and link issues (#​4205, #​3938)
  • docs: fix route group example code (#​4020)
  • docs(readme): add Portuguese documentation (#​4078)
  • docs(context): fix some function names in comment (#​4079)

v1.10.1

Compare Source

Features
  • refactor: strengthen HTTPS security and improve code organization
  • feat(binding): Support custom BindUnmarshaler for binding. (#​3933)
Enhancements
  • chore(deps): bump github.com/bytedance/sonic from 1.11.3 to 1.11.6 (#​3940)
  • chore(deps): bump golangci/golangci-lint-action from 4 to 5 (#​3941)
  • chore: update external dependencies to latest versions (#​3950)
  • chore: update various Go dependencies to latest versions (#​3901)
  • chore: refactor configuration files for better readability (#​3951)
  • chore: update changelog categories and improve documentation (#​3917)
  • feat: update version constant to v1.10.0 (#​3952)
Build process updates
  • ci(release): refactor changelog regex patterns and exclusions (#​3914)
  • ci(Makefile): vet command add .PHONY (#​3915)

Configuration

📅 Schedule: Branch creation - Between 12:00 AM and 03:59 AM, only on Monday ( * 0-3 * * 1 ) in timezone America/Los_Angeles, Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added dependencies Pull requests that update a dependency file go labels Jun 2, 2025
@renovate renovate bot enabled auto-merge (squash) June 2, 2025 09:32
@renovate renovate bot force-pushed the renovate/github.com-gin-gonic-gin-1.x branch from 3d0e231 to 67e1730 Compare September 20, 2025 13:30
@renovate renovate bot changed the title Update module github.com/gin-gonic/gin to v1.10.1 Update module github.com/gin-gonic/gin to v1.11.0 Sep 20, 2025
@renovate
Copy link
Contributor Author

renovate bot commented Sep 20, 2025

ℹ Artifact update notice

File name: examples/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 15 additional dependencies were updated

Details:

Package Change
github.com/bytedance/sonic v1.11.6 -> v1.14.0
github.com/bytedance/sonic/loader v0.1.1 -> v0.3.0
github.com/cloudwego/base64x v0.1.4 -> v0.1.6
github.com/gabriel-vasile/mimetype v1.4.3 -> v1.4.8
github.com/gin-contrib/sse v0.1.0 -> v1.1.0
github.com/go-playground/validator/v10 v10.20.0 -> v10.27.0
github.com/klauspost/cpuid/v2 v2.2.7 -> v2.3.0
github.com/pelletier/go-toml/v2 v2.2.2 -> v2.2.4
github.com/ugorji/go/codec v1.2.12 -> v1.3.0
golang.org/x/arch v0.8.0 -> v0.20.0
golang.org/x/crypto v0.36.0 -> v0.40.0
golang.org/x/net v0.37.0 -> v0.42.0
golang.org/x/sys v0.31.0 -> v0.35.0
golang.org/x/text v0.23.0 -> v0.27.0
google.golang.org/protobuf v1.34.1 -> v1.36.9
File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 13 additional dependencies were updated

Details:

Package Change
github.com/bytedance/sonic v1.11.6 -> v1.14.0
github.com/bytedance/sonic/loader v0.1.1 -> v0.3.0
github.com/cloudwego/base64x v0.1.4 -> v0.1.6
github.com/gabriel-vasile/mimetype v1.4.3 -> v1.4.8
github.com/gin-contrib/sse v0.1.0 -> v1.1.0
github.com/go-playground/validator/v10 v10.20.0 -> v10.27.0
github.com/klauspost/cpuid/v2 v2.2.7 -> v2.3.0
github.com/pelletier/go-toml/v2 v2.2.2 -> v2.2.4
github.com/ugorji/go/codec v1.2.12 -> v1.3.0
golang.org/x/arch v0.8.0 -> v0.20.0
golang.org/x/crypto v0.36.0 -> v0.40.0
golang.org/x/net v0.37.0 -> v0.42.0
golang.org/x/sys v0.31.0 -> v0.35.0

@renovate renovate bot changed the title Update module github.com/gin-gonic/gin to v1.11.0 Update module github.com/gin-gonic/gin to v1.11.0 - autoclosed Oct 9, 2025
@renovate renovate bot closed this Oct 9, 2025
auto-merge was automatically disabled October 9, 2025 16:51

Pull request was closed

@renovate renovate bot deleted the renovate/github.com-gin-gonic-gin-1.x branch October 9, 2025 16:51
| datasource | package                  | from    | to      |
| ---------- | ------------------------ | ------- | ------- |
| go         | github.com/gin-gonic/gin | v1.10.0 | v1.11.0 |


Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate bot changed the title Update module github.com/gin-gonic/gin to v1.11.0 - autoclosed Update module github.com/gin-gonic/gin to v1.11.0 Oct 13, 2025
@renovate renovate bot reopened this Oct 13, 2025
@renovate renovate bot force-pushed the renovate/github.com-gin-gonic-gin-1.x branch 2 times, most recently from 67e1730 to 0266f48 Compare October 13, 2025 09:14
@github-actions
Copy link

github-actions bot commented Oct 13, 2025

Dependency Review

The following issues were found:
  • ❌ 2 vulnerable package(s)
  • ✅ 0 package(s) with incompatible licenses
  • ✅ 0 package(s) with invalid SPDX license definitions
  • ⚠️ 20 package(s) with unknown licenses.
See the Details below.

Vulnerabilities

examples/go.mod

NameVersionVulnerabilitySeverity
github.com/quic-go/quic-go0.54.0quic-go: Panic occurs when queuing undecryptable packets after handshake completionhigh

go.mod

NameVersionVulnerabilitySeverity
github.com/quic-go/quic-go0.54.0quic-go: Panic occurs when queuing undecryptable packets after handshake completionhigh
github.com/quic-go/quic-go0.54.0quic-go: Panic occurs when queuing undecryptable packets after handshake completionhigh

License Issues

examples/go.mod

PackageVersionLicenseIssue Type
golang.org/x/arch0.20.0NullUnknown License
golang.org/x/crypto0.40.0NullUnknown License
golang.org/x/mod0.25.0NullUnknown License
golang.org/x/net0.42.0NullUnknown License
golang.org/x/sync0.16.0NullUnknown License
golang.org/x/sys0.35.0NullUnknown License
golang.org/x/text0.27.0NullUnknown License
golang.org/x/tools0.34.0NullUnknown License
google.golang.org/protobuf1.36.9NullUnknown License
github.com/pelletier/go-toml/v22.2.4NullUnknown License

go.mod

PackageVersionLicenseIssue Type
golang.org/x/arch0.20.0NullUnknown License
golang.org/x/crypto0.40.0NullUnknown License
golang.org/x/mod0.25.0NullUnknown License
golang.org/x/net0.42.0NullUnknown License
golang.org/x/sync0.16.0NullUnknown License
golang.org/x/sys0.35.0NullUnknown License
golang.org/x/text0.27.0NullUnknown License
golang.org/x/tools0.34.0NullUnknown License
google.golang.org/protobuf1.36.9NullUnknown License
github.com/pelletier/go-toml/v22.2.4NullUnknown License

OpenSSF Scorecard

Scorecard details
PackageVersionScoreDetails
gomod/github.com/quic-go/quic-go 0.54.0 🟢 6.9
Details
CheckScoreReason
Code-Review⚠️ 1Found 5/29 approved changesets -- score normalized to 1
Maintained🟢 1030 commit(s) and 23 issue activity found in the last 90 days -- score normalized to 10
Security-Policy🟢 10security policy file detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Binary-Artifacts🟢 10no binaries found in the repo
License🟢 10license file detected
Fuzzing🟢 10project is fuzzed
Vulnerabilities🟢 100 existing vulnerabilities detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Signed-Releases⚠️ -1no releases found
Pinned-Dependencies⚠️ 1dependency not pinned by hash detected -- score normalized to 1
Packaging🟢 10packaging workflow detected
SAST🟢 4SAST tool is not run on all commits -- score normalized to 4
gomod/github.com/bytedance/sonic 1.14.0 🟢 7.1
Details
CheckScoreReason
Code-Review🟢 10all changesets reviewed
Maintained🟢 1015 commit(s) and 17 issue activity found in the last 90 days -- score normalized to 10
Packaging⚠️ -1packaging workflow not detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Binary-Artifacts🟢 10no binaries found in the repo
License🟢 10license file detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing🟢 10project is fuzzed
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Vulnerabilities🟢 100 existing vulnerabilities detected
SAST🟢 8SAST tool is not run on all commits -- score normalized to 8
gomod/github.com/bytedance/sonic/loader 0.3.0 🟢 7.1
Details
CheckScoreReason
Code-Review🟢 10all changesets reviewed
Maintained🟢 1015 commit(s) and 17 issue activity found in the last 90 days -- score normalized to 10
Packaging⚠️ -1packaging workflow not detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Binary-Artifacts🟢 10no binaries found in the repo
License🟢 10license file detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing🟢 10project is fuzzed
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Vulnerabilities🟢 100 existing vulnerabilities detected
SAST🟢 8SAST tool is not run on all commits -- score normalized to 8
gomod/github.com/cloudwego/base64x 0.1.6 UnknownUnknown
gomod/github.com/gabriel-vasile/mimetype 1.4.8 🟢 7.6
Details
CheckScoreReason
Packaging⚠️ -1packaging workflow not detected
Binary-Artifacts🟢 10no binaries found in the repo
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Code-Review⚠️ 2Found 6/23 approved changesets -- score normalized to 2
Maintained🟢 1030 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Security-Policy⚠️ 0security policy file not detected
CII-Best-Practices🟢 5badge detected: Passing
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Vulnerabilities🟢 100 existing vulnerabilities detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 10SAST tool is run on all commits
gomod/github.com/gin-contrib/sse 1.1.0 🟢 4.2
Details
CheckScoreReason
Maintained⚠️ 00 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Binary-Artifacts🟢 10no binaries found in the repo
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Code-Review⚠️ 0Found 1/11 approved changesets -- score normalized to 0
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Vulnerabilities🟢 100 existing vulnerabilities detected
Signed-Releases⚠️ -1no releases found
Packaging🟢 10packaging workflow detected
Branch-Protection⚠️ 0branch protection not enabled on development/release branches
SAST🟢 7SAST tool detected but not run on all commits
gomod/github.com/gin-gonic/gin 1.11.0 🟢 6.2
Details
CheckScoreReason
Maintained🟢 1030 commit(s) and 9 issue activity found in the last 90 days -- score normalized to 10
Code-Review🟢 5Found 11/22 approved changesets -- score normalized to 5
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Binary-Artifacts🟢 10no binaries found in the repo
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Security-Policy⚠️ 0security policy file not detected
License🟢 10license file detected
Fuzzing⚠️ 0project is not fuzzed
Packaging🟢 10packaging workflow detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Signed-Releases⚠️ -1no releases found
Vulnerabilities🟢 100 existing vulnerabilities detected
SAST🟢 9SAST tool detected but not run on all commits
gomod/github.com/go-playground/validator/v10 10.27.0 🟢 5.7
Details
CheckScoreReason
Packaging⚠️ -1packaging workflow not detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Maintained🟢 1012 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Code-Review🟢 8Found 19/22 approved changesets -- score normalized to 8
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Binary-Artifacts🟢 10no binaries found in the repo
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Vulnerabilities🟢 100 existing vulnerabilities detected
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
gomod/github.com/goccy/go-yaml 1.18.0 🟢 4
Details
CheckScoreReason
Maintained🟢 40 commit(s) and 5 issue activity found in the last 90 days -- score normalized to 4
Binary-Artifacts🟢 10no binaries found in the repo
Code-Review🟢 5Found 17/30 approved changesets -- score normalized to 5
Packaging⚠️ -1packaging workflow not detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ 0branch protection not enabled on development/release branches
Vulnerabilities⚠️ 010 existing vulnerabilities detected
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
gomod/github.com/klauspost/cpuid/v2 2.3.0 🟢 3.7
Details
CheckScoreReason
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Code-Review🟢 6Found 19/30 approved changesets -- score normalized to 6
Binary-Artifacts🟢 10no binaries found in the repo
Maintained🟢 33 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 3
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Security-Policy⚠️ 0security policy file not detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Packaging🟢 10packaging workflow detected
Vulnerabilities⚠️ 010 existing vulnerabilities detected
Signed-Releases⚠️ 0Project has not signed or included provenance with any releases.
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
gomod/github.com/pelletier/go-toml/v2 2.2.4 🟢 6.7
Details
CheckScoreReason
Maintained🟢 98 commit(s) and 3 issue activity found in the last 90 days -- score normalized to 9
Binary-Artifacts🟢 10no binaries found in the repo
Code-Review🟢 6Found 15/24 approved changesets -- score normalized to 6
Security-Policy🟢 10security policy file detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Fuzzing🟢 10project is fuzzed
License🟢 9license file detected
Packaging🟢 10packaging workflow detected
Vulnerabilities🟢 100 existing vulnerabilities detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Signed-Releases⚠️ 0Project has not signed or included provenance with any releases.
SAST🟢 7SAST tool detected but not run on all commits
gomod/github.com/quic-go/qpack 0.5.1 🟢 3.7
Details
CheckScoreReason
Code-Review⚠️ 0Found 2/23 approved changesets -- score normalized to 0
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Maintained⚠️ 23 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 2
Packaging⚠️ -1packaging workflow not detected
Binary-Artifacts🟢 10no binaries found in the repo
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Vulnerabilities🟢 73 existing vulnerabilities detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Security-Policy⚠️ 0security policy file not detected
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
gomod/github.com/ugorji/go/codec 1.3.0 🟢 3.7
Details
CheckScoreReason
Code-Review⚠️ 0Found 0/30 approved changesets -- score normalized to 0
Maintained🟢 32 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 3
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
SAST⚠️ 0no SAST tool detected
Binary-Artifacts🟢 10no binaries found in the repo
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ 0branch protection not enabled on development/release branches
Vulnerabilities🟢 100 existing vulnerabilities detected
gomod/go.uber.org/mock 0.5.0 UnknownUnknown
gomod/golang.org/x/arch 0.20.0 UnknownUnknown
gomod/golang.org/x/crypto 0.40.0 UnknownUnknown
gomod/golang.org/x/mod 0.25.0 UnknownUnknown
gomod/golang.org/x/net 0.42.0 UnknownUnknown
gomod/golang.org/x/sync 0.16.0 UnknownUnknown
gomod/golang.org/x/sys 0.35.0 UnknownUnknown
gomod/golang.org/x/text 0.27.0 UnknownUnknown
gomod/golang.org/x/tools 0.34.0 UnknownUnknown
gomod/google.golang.org/protobuf 1.36.9 UnknownUnknown
gomod/github.com/quic-go/quic-go 0.54.0 🟢 6.9
Details
CheckScoreReason
Code-Review⚠️ 1Found 5/29 approved changesets -- score normalized to 1
Maintained🟢 1030 commit(s) and 23 issue activity found in the last 90 days -- score normalized to 10
Security-Policy🟢 10security policy file detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Binary-Artifacts🟢 10no binaries found in the repo
License🟢 10license file detected
Fuzzing🟢 10project is fuzzed
Vulnerabilities🟢 100 existing vulnerabilities detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Signed-Releases⚠️ -1no releases found
Pinned-Dependencies⚠️ 1dependency not pinned by hash detected -- score normalized to 1
Packaging🟢 10packaging workflow detected
SAST🟢 4SAST tool is not run on all commits -- score normalized to 4
gomod/github.com/bytedance/sonic 1.14.0 🟢 7.1
Details
CheckScoreReason
Code-Review🟢 10all changesets reviewed
Maintained🟢 1015 commit(s) and 17 issue activity found in the last 90 days -- score normalized to 10
Packaging⚠️ -1packaging workflow not detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Binary-Artifacts🟢 10no binaries found in the repo
License🟢 10license file detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing🟢 10project is fuzzed
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Vulnerabilities🟢 100 existing vulnerabilities detected
SAST🟢 8SAST tool is not run on all commits -- score normalized to 8
gomod/github.com/bytedance/sonic/loader 0.3.0 🟢 7.1
Details
CheckScoreReason
Code-Review🟢 10all changesets reviewed
Maintained🟢 1015 commit(s) and 17 issue activity found in the last 90 days -- score normalized to 10
Packaging⚠️ -1packaging workflow not detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Binary-Artifacts🟢 10no binaries found in the repo
License🟢 10license file detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing🟢 10project is fuzzed
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Vulnerabilities🟢 100 existing vulnerabilities detected
SAST🟢 8SAST tool is not run on all commits -- score normalized to 8
gomod/github.com/cloudwego/base64x 0.1.6 UnknownUnknown
gomod/github.com/gabriel-vasile/mimetype 1.4.8 🟢 7.6
Details
CheckScoreReason
Packaging⚠️ -1packaging workflow not detected
Binary-Artifacts🟢 10no binaries found in the repo
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Code-Review⚠️ 2Found 6/23 approved changesets -- score normalized to 2
Maintained🟢 1030 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Security-Policy⚠️ 0security policy file not detected
CII-Best-Practices🟢 5badge detected: Passing
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Vulnerabilities🟢 100 existing vulnerabilities detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 10SAST tool is run on all commits
gomod/github.com/gin-contrib/sse 1.1.0 🟢 4.2
Details
CheckScoreReason
Maintained⚠️ 00 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Binary-Artifacts🟢 10no binaries found in the repo
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Code-Review⚠️ 0Found 1/11 approved changesets -- score normalized to 0
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Vulnerabilities🟢 100 existing vulnerabilities detected
Signed-Releases⚠️ -1no releases found
Packaging🟢 10packaging workflow detected
Branch-Protection⚠️ 0branch protection not enabled on development/release branches
SAST🟢 7SAST tool detected but not run on all commits
gomod/github.com/gin-gonic/gin 1.11.0 🟢 6.2
Details
CheckScoreReason
Maintained🟢 1030 commit(s) and 9 issue activity found in the last 90 days -- score normalized to 10
Code-Review🟢 5Found 11/22 approved changesets -- score normalized to 5
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Binary-Artifacts🟢 10no binaries found in the repo
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Security-Policy⚠️ 0security policy file not detected
License🟢 10license file detected
Fuzzing⚠️ 0project is not fuzzed
Packaging🟢 10packaging workflow detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Signed-Releases⚠️ -1no releases found
Vulnerabilities🟢 100 existing vulnerabilities detected
SAST🟢 9SAST tool detected but not run on all commits
gomod/github.com/go-playground/validator/v10 10.27.0 🟢 5.7
Details
CheckScoreReason
Packaging⚠️ -1packaging workflow not detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Maintained🟢 1012 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Code-Review🟢 8Found 19/22 approved changesets -- score normalized to 8
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Binary-Artifacts🟢 10no binaries found in the repo
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Vulnerabilities🟢 100 existing vulnerabilities detected
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
gomod/github.com/goccy/go-yaml 1.18.0 🟢 4
Details
CheckScoreReason
Maintained🟢 40 commit(s) and 5 issue activity found in the last 90 days -- score normalized to 4
Binary-Artifacts🟢 10no binaries found in the repo
Code-Review🟢 5Found 17/30 approved changesets -- score normalized to 5
Packaging⚠️ -1packaging workflow not detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ 0branch protection not enabled on development/release branches
Vulnerabilities⚠️ 010 existing vulnerabilities detected
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
gomod/github.com/klauspost/cpuid/v2 2.3.0 🟢 3.7
Details
CheckScoreReason
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Code-Review🟢 6Found 19/30 approved changesets -- score normalized to 6
Binary-Artifacts🟢 10no binaries found in the repo
Maintained🟢 33 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 3
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Security-Policy⚠️ 0security policy file not detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Packaging🟢 10packaging workflow detected
Vulnerabilities⚠️ 010 existing vulnerabilities detected
Signed-Releases⚠️ 0Project has not signed or included provenance with any releases.
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
gomod/github.com/pelletier/go-toml/v2 2.2.4 🟢 6.7
Details
CheckScoreReason
Maintained🟢 98 commit(s) and 3 issue activity found in the last 90 days -- score normalized to 9
Binary-Artifacts🟢 10no binaries found in the repo
Code-Review🟢 6Found 15/24 approved changesets -- score normalized to 6
Security-Policy🟢 10security policy file detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Fuzzing🟢 10project is fuzzed
License🟢 9license file detected
Packaging🟢 10packaging workflow detected
Vulnerabilities🟢 100 existing vulnerabilities detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Signed-Releases⚠️ 0Project has not signed or included provenance with any releases.
SAST🟢 7SAST tool detected but not run on all commits
gomod/github.com/quic-go/qpack 0.5.1 🟢 3.7
Details
CheckScoreReason
Code-Review⚠️ 0Found 2/23 approved changesets -- score normalized to 0
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Maintained⚠️ 23 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 2
Packaging⚠️ -1packaging workflow not detected
Binary-Artifacts🟢 10no binaries found in the repo
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Vulnerabilities🟢 73 existing vulnerabilities detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Security-Policy⚠️ 0security policy file not detected
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
gomod/github.com/ugorji/go/codec 1.3.0 🟢 3.7
Details
CheckScoreReason
Code-Review⚠️ 0Found 0/30 approved changesets -- score normalized to 0
Maintained🟢 32 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 3
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
SAST⚠️ 0no SAST tool detected
Binary-Artifacts🟢 10no binaries found in the repo
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ 0branch protection not enabled on development/release branches
Vulnerabilities🟢 100 existing vulnerabilities detected
gomod/go.uber.org/mock 0.5.0 UnknownUnknown
gomod/golang.org/x/arch 0.20.0 UnknownUnknown
gomod/golang.org/x/crypto 0.40.0 UnknownUnknown
gomod/golang.org/x/mod 0.25.0 UnknownUnknown
gomod/golang.org/x/net 0.42.0 UnknownUnknown
gomod/golang.org/x/sync 0.16.0 UnknownUnknown
gomod/golang.org/x/sys 0.35.0 UnknownUnknown
gomod/golang.org/x/text 0.27.0 UnknownUnknown
gomod/golang.org/x/tools 0.34.0 UnknownUnknown
gomod/google.golang.org/protobuf 1.36.9 UnknownUnknown

Scanned Files

  • examples/go.mod
  • go.mod

@renovate renovate bot enabled auto-merge (squash) October 13, 2025 14:43
@renovate
Copy link
Contributor Author

renovate bot commented Dec 15, 2025

ℹ️ Artifact update notice

File name: examples/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 15 additional dependencies were updated

Details:

Package Change
github.com/bytedance/sonic v1.11.6 -> v1.14.0
github.com/bytedance/sonic/loader v0.1.1 -> v0.3.0
github.com/cloudwego/base64x v0.1.4 -> v0.1.6
github.com/gabriel-vasile/mimetype v1.4.3 -> v1.4.8
github.com/gin-contrib/sse v0.1.0 -> v1.1.0
github.com/go-playground/validator/v10 v10.20.0 -> v10.27.0
github.com/klauspost/cpuid/v2 v2.2.7 -> v2.3.0
github.com/pelletier/go-toml/v2 v2.2.2 -> v2.2.4
github.com/ugorji/go/codec v1.2.12 -> v1.3.0
golang.org/x/arch v0.8.0 -> v0.20.0
golang.org/x/crypto v0.36.0 -> v0.40.0
golang.org/x/net v0.37.0 -> v0.42.0
golang.org/x/sys v0.31.0 -> v0.35.0
golang.org/x/text v0.23.0 -> v0.27.0
google.golang.org/protobuf v1.34.1 -> v1.36.9
File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 13 additional dependencies were updated

Details:

Package Change
github.com/bytedance/sonic v1.11.6 -> v1.14.0
github.com/bytedance/sonic/loader v0.1.1 -> v0.3.0
github.com/cloudwego/base64x v0.1.4 -> v0.1.6
github.com/gabriel-vasile/mimetype v1.4.3 -> v1.4.8
github.com/gin-contrib/sse v0.1.0 -> v1.1.0
github.com/go-playground/validator/v10 v10.20.0 -> v10.27.0
github.com/klauspost/cpuid/v2 v2.2.7 -> v2.3.0
github.com/pelletier/go-toml/v2 v2.2.2 -> v2.2.4
github.com/ugorji/go/codec v1.2.12 -> v1.3.0
golang.org/x/arch v0.8.0 -> v0.20.0
golang.org/x/crypto v0.36.0 -> v0.40.0
golang.org/x/net v0.37.0 -> v0.42.0
golang.org/x/sys v0.31.0 -> v0.35.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant