Paul Scheduikat
Paul Scheduikat
@Bnyro Thanks for fixing this.
As a MVP this could also just be a link to a text file, but yes optimally this would have upstream support.
@yeah-Buddyy there isn't much we can do here as any signatures related to garble will get added to the database as soon as some kind of malware uses that newer...
@yeah-Buddyy what do you mean by excluding complier paths
@hello-sucess This is probably fixed now, can you test again with current master `go install mvdan.cc/garble@master`? Feel free to reopen if not fixed.
Any types that are passed directly to this function as the "object" parameter will not be obfuscated in order to not break reflection. This may still break on complex types...
@Haif-07 This is probably fixed now, can you test again with current master `go install mvdan.cc/garble@master`? Feel free to reopen if not fixed.
This is likely fixed in master: `go install mvdan.cc/garble@master`
Can you share a full example to reproduce this?
I definitely had this happen to me before but didn't know how to reproduce it.