deps.dev does an absolutely terrible job with Go dependencies. It thinks modules are the unit of dependency rather than packages. Consequentially, it reports vulnerabilities in packages that are never even imported. For example, <a href="https://deps.dev/go/filippo.io%2Fsunlight" rel="nofollow">https://deps.dev/go/filippo.io%2Fsunlight</a> shows a "9.1 CRITICAL" vulnerability in a supposed SSH dependency from a project that has nothing to do with SSH.<p>Google ought to be embarrassed by this, especially when govulncheck <<a href="https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck" rel="nofollow">https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck</a>> exists and actually checks whether vulnerable code is reachable.
I don't know how well this makes you understand your dependencies. As for C/C++ a lot of people probably depend on stb single header files libraries. There's stb_truetype but it specifically mentions not to use it on any untrusted/outside .ttf files which I do like but you have to keep in mind to bake to bitmaps or only use your own .ttf provided files, thus I would put this dependency in another place like tooling. Is there a way to do this in other languages like JS and NPM? Maybe carefully choosing which dependencies you include is better?<p><a href="https://github.com/nothings/stb/blob/master/stb_truetype.h#L6">https://github.com/nothings/stb/blob/master/stb_truetype.h#L...</a>
Surprising that Click <a href="https://deps.dev/pypi/click/8.1.8" rel="nofollow">https://deps.dev/pypi/click/8.1.8</a> is listed as "license unknown" - <a href="https://pypi.org/project/click/" rel="nofollow">https://pypi.org/project/click/</a> knows that it's BSD.