Get the latest tech news

Abusing Go's Infrastructure


I apologize if this information is already known, but I couldn’t find any references about it and I wanted to understand what was going on and share with you because I think there is some value doing it. In case this wasn’t known, I apologize to the Go team for not talking to them first and jumping the full disclosure gun (I don’t think it’s that severe). I really like Go!

In case this wasn’t known, I apologize to the Go team for not talking to them first and jumping the full disclosure gun (I don’t think it’s that severe). The next step is to verify wheter a new Go module repository will be added to the checksum database and proxy if we call the lookup endpoint, as described. Go authors don’t seem to be completely unaware of this kind of scenario and implemented some restrictions, which are described in File path and size constraints section.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of infrastructure

infrastructure

Photo of Abusing Go

Abusing Go

Related news:

News photo

How planning and infrastructure failed during Maui wildfires

News photo

FBI Says Chinese Hackers Preparing To Attack US Infrastructure

News photo

FBI says Chinese hackers preparing to attack US infrastructure