ARGEMMA BLOG

Notes on Go's CVE-2026-27137 and CVE-2026-27138

Go 1.26.1 fixes two crypto/x509 CVEs: a name constraint bypass that silently dropped duplicate email keys, and a panic from empty SAN values.

The Lethal Trifecta, But You Don't Get a Choice

AI coding agents on proprietary code already meet two of the three conditions for data exfiltration. Egress controls are your primary lever.

Go's filepath.Clean does not prevent path traversal

Go's filepath.Clean doesn't prevent path traversal despite its name. Learn why it fails, see a real-world vulnerability, and how os.Root fixes it.

A threat model for RAG features

A threat model for RAG features covering untrusted source data, query authorization flaws, sensitive document exposure, and conversation context leaks.

On string comparison timing attacks in Go

Go's string comparison leaks timing info, but compares in chunks, making timing attacks impractical. However, you should still use constant time comparison.