An open API service providing repository metadata for many open source software ecosystems.

GitHub / projectdiscovery / simplehttpserver

Go alternative of python SimpleHTTPServer

JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/projectdiscovery%2Fsimplehttpserver
PURL: pkg:github/projectdiscovery/simplehttpserver

Stars: 531
Forks: 57
Open issues: 7

License: mit
Language: Go
Size: 245 KB
Dependencies parsed at: Pending

Created at: about 5 years ago
Updated at: 6 days ago
Pushed at: 12 days ago
Last synced at: 3 days ago

Topics: gohttpserver, simplehttpserver

OpenSSF Scorecard report

4.8

Overall Score

10/10 Critical Risk
23/60 High Risk
17/40 Medium Risk
10/20 Low Risk
Generated on August 11, 2025 | Scorecard vv5.2.1-40-gf6ed084d
Security Checks
10/10
Binary-Artifacts
High Risk

no binaries found in the repo

Determines if the project has generated executable (binary) artifacts in the source repository.

10/10
Dangerous-Workflow
Critical Risk

no dangerous workflow patterns detected

Determines if the project's GitHub Action workflows avoid dangerous patterns.

10/10
License
Low Risk

license file detected

Determines if the project has defined a license.

Show details
ℹ️ Info: project has a license file: LICENSE.md:0
ℹ️ Info: FSF or OSI recognized license: MIT License: LICENSE.md:0
10/10
Security-Policy
Medium Risk

security policy file detected

Determines if the project has published a security policy.

Show details
ℹ️ Info: security policy file detected: SECURITY.md:1
ℹ️ Info: Found linked content: SECURITY.md:1
ℹ️ Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1
ℹ️ Info: Found text in security policy: SECURITY.md:1
8/10
Code-Review
High Risk

Found 6/7 approved changesets -- score normalized to 8

Determines if the project requires human code review before pull requests (aka merge requests) are merged.

7/10
SAST
Medium Risk

SAST tool detected but not run on all commits

Determines if the project uses static code analysis.

Show details
ℹ️ Info: SAST configuration detected: CodeQL
⚠️ Warn: 0 commits out of 30 are checked with a SAST tool
5/10
Vulnerabilities
High Risk

5 existing vulnerabilities detected

Determines if the project has open, known unfixed vulnerabilities.

Show details
⚠️ Warn: Project is vulnerable to: GHSA-h74j-692g-48mq
⚠️ Warn: Project is vulnerable to: GO-2025-3605 / GHSA-7vpp-9cxj-q8gv
⚠️ Warn: Project is vulnerable to: GO-2024-2698 / GHSA-rhh4-rh7c-7r5v
⚠️ Warn: Project is vulnerable to: GO-2020-0016 / GHSA-25xm-hr59-7c27
⚠️ Warn: Project is vulnerable to: GHSA-q6gq-997w-f55g
0/10
CII-Best-Practices
Low Risk

no effort to earn an OpenSSF best practices badge detected

Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.

0/10
Fuzzing
Medium Risk

project is not fuzzed

Determines if the project uses fuzzing.

Show details
⚠️ Warn: no fuzzer integrations found
0/10
Maintained
High Risk

0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0

Determines if the project is "actively maintained".

0/10
Pinned-Dependencies
Medium Risk

dependency not pinned by hash detected -- score normalized to 0

Determines if the project has declared and pinned the dependencies of its build process.

Show details
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build-test.yml:17: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/build-test.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build-test.yml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/build-test.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:29: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/codeql-analysis.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:33: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/codeql-analysis.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:38: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/codeql-analysis.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:41: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/codeql-analysis.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/dockerhub-push.yml:16: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/dockerhub-push.yml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/dockerhub-push.yml:19: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/dockerhub-push.yml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/dockerhub-push.yml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/dockerhub-push.yml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/dockerhub-push.yml:25: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/dockerhub-push.yml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/dockerhub-push.yml:31: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/dockerhub-push.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/lint-test.yml:16: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/lint-test.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/lint-test.yml:20: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/lint-test.yml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/lint-test.yml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/lint-test.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release-binary.yml:14: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/release-binary.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release-binary.yml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/release-binary.yml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/release-binary.yml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/projectdiscovery/simplehttpserver/release-binary.yml/main?enable=pin
⚠️ Warn: containerImage not pinned by hash: Dockerfile:1
⚠️ Warn: containerImage not pinned by hash: Dockerfile:4: pin your Docker image by updating alpine:latest to alpine:latest@sha256:4bcff63911fcb4448bd4fdacec207030997caf25e9bea4045fa6c8c44de311d1
⚠️ Warn: goCommand not pinned by hash: Dockerfile:2
ℹ️ Info: 0 out of 11 GitHub-owned GitHubAction dependencies pinned
ℹ️ Info: 0 out of 6 third-party GitHubAction dependencies pinned
ℹ️ Info: 0 out of 2 containerImage dependencies pinned
ℹ️ Info: 0 out of 1 goCommand dependencies pinned
0/10
Signed-Releases
High Risk

Project has not signed or included provenance with any releases.

Determines if the project cryptographically signs release artifacts.

Show details
⚠️ Warn: release artifact v0.0.6 not signed: https://api.github.com/repos/projectdiscovery/simplehttpserver/releases/96219472
⚠️ Warn: release artifact v0.0.5 not signed: https://api.github.com/repos/projectdiscovery/simplehttpserver/releases/64643682
⚠️ Warn: release artifact v0.0.4 not signed: https://api.github.com/repos/projectdiscovery/simplehttpserver/releases/46917940
⚠️ Warn: release artifact v0.0.3 not signed: https://api.github.com/repos/projectdiscovery/simplehttpserver/releases/41600524
⚠️ Warn: release artifact v0.0.2 not signed: https://api.github.com/repos/projectdiscovery/simplehttpserver/releases/41565934
⚠️ Warn: release artifact v0.0.6 does not have provenance: https://api.github.com/repos/projectdiscovery/simplehttpserver/releases/96219472
⚠️ Warn: release artifact v0.0.5 does not have provenance: https://api.github.com/repos/projectdiscovery/simplehttpserver/releases/64643682
⚠️ Warn: release artifact v0.0.4 does not have provenance: https://api.github.com/repos/projectdiscovery/simplehttpserver/releases/46917940
⚠️ Warn: release artifact v0.0.3 does not have provenance: https://api.github.com/repos/projectdiscovery/simplehttpserver/releases/41600524
⚠️ Warn: release artifact v0.0.2 does not have provenance: https://api.github.com/repos/projectdiscovery/simplehttpserver/releases/41565934
0/10
Token-Permissions
High Risk

detected GitHub workflow tokens with excessive permissions

Determines if the project's workflows follow the principle of least privilege.

Show details
ℹ️ Info: jobLevel 'actions' permission set to 'read': .github/workflows/codeql-analysis.yml:17
ℹ️ Info: jobLevel 'contents' permission set to 'read': .github/workflows/codeql-analysis.yml:18
⚠️ Warn: no topLevel permission defined: .github/workflows/build-test.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/codeql-analysis.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/dockerhub-push.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/lint-test.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/release-binary.yml:1
ℹ️ Info: no jobLevel write permissions found
N/A
Branch-Protection
Not Applicable

internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration

Determines if the default and release branches are protected with GitHub's branch protection settings.

N/A
Packaging
Not Applicable

packaging workflow not detected

Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.

Show details
⚠️ Warn: no GitHub/GitLab publishing workflow detected.