Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Identify, assess, and fix security vulnerabilities in Go modules using govulncheck. Handle common vulnerabilities like JWT issues and ensure application stability during fixes.
Identify, assess, and fix security vulnerabilities in Go modules using govulncheck. Handle common vulnerabilities like JWT issues and ensure application stability during fixes.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Use Go tooling to identify, assess, and fix security vulnerabilities in Go modules. This skill helps detect and remediate vulnerabilities while maintaining application functionality.
Scan for vulnerabilities in your Go project: go install golang.org/x/vuln/cmd/govulncheck@latest govulncheck ./... Check specific modules for known vulnerabilities: govulncheck -show verbose ./...
Identify Affected Packages: Determine which dependencies contain vulnerabilities Check Severity: Review the CVE details and potential impact Verify Usage: Confirm if the vulnerable functions are actually used in your code Plan Remediation: Choose the appropriate fix strategy
Update vulnerable packages to secure versions: go get -u vulnerable/package@latest go mod tidy
For vulnerabilities in transitive dependencies: go mod why vulnerable/package # Understand why it's included go mod edit -replace vulnerable/package=newer-version # Replace if needed go mod tidy
If a dependency is unused or can be replaced: Remove direct imports of the vulnerable code Run go mod tidy to clean up unused dependencies Verify application functionality remains intact
After applying fixes: # Verify no vulnerabilities remain govulncheck ./... # Ensure application still builds go build ./... # Run tests to verify functionality go test ./...
Issue: github.com/golang-jwt/jwt GO-2025-3553 (excessive memory allocation) Fix: Update to newer version or switch to golang.org/x/oauth2 alternatives
Keep Go version updated for security patches Run go vuln to check for stdlib vulnerabilities
Regularly scan dependencies with govulncheck Keep dependencies updated with go get -u Use go mod tidy to remove unused dependencies Test thoroughly after vulnerability fixes Monitor for new vulnerabilities with automated tools
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.