Study how security bugs appear in Go applications through exploitation, code review snippets, and CVE patch analysis across injection, path traversal, authentication, and more.
Start with injection vulnerabilities in Go: SQL injection through unsafe database/sql usage, LDAP injection, XPath injection, and delimiter-based attacks in Go string handling.
Finish with cross-site scripting in Go templates, CORS bypasses, denial of service, information leaks, host header injection, and insecure transport patterns.