You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To resolve the following High Sev vulnerabilities, update go.mod to use github.com/stretchr/testify v1.9.0 instead of github.com/stretchr/testify v1.7.0
To resolve the following High Sev vulnerabilities, update go.mod to use
github.com/stretchr/testify v1.9.0
instead ofgithub.com/stretchr/testify v1.7.0
Snyk test output before:
✗ High severity vulnerability found in gopkg.in/yaml.v3
Description: Denial of Service (DoS)
Info: https://security.snyk.io/vuln/SNYK-GOLANG-GOPKGINYAMLV3-2841557
Introduced through: github.com/stretchr/testify/[email protected]
From: github.com/stretchr/testify/[email protected] > github.com/stretchr/testify/[email protected] > gopkg.in/yaml.v3@#9f266ea9e77c
Fixed in: 3.0.0
✗ High severity vulnerability found in gopkg.in/yaml.v3
Description: NULL Pointer Dereference
Info: https://security.snyk.io/vuln/SNYK-GOLANG-GOPKGINYAMLV3-2952714
Introduced through: github.com/stretchr/testify/[email protected]
From: github.com/stretchr/testify/[email protected] > github.com/stretchr/testify/[email protected] > gopkg.in/yaml.v3@#9f266ea9e77c
Fixed in: 3.0.1
Snyk test output after:
✔ Tested 6 dependencies for known issues, no vulnerable paths found.
The text was updated successfully, but these errors were encountered: