- Introduced AGENTS.md, README.md, TASKS.md, and implementation_plan.md for Vexer, detailing mission, responsibilities, key components, and operational notes. - Established similar documentation structure for Vulnerability Explorer and Zastava modules, including their respective workflows, integrations, and observability notes. - Created risk scoring profiles documentation outlining the core workflow, factor model, governance, and deliverables. - Ensured all modules adhere to the Aggregation-Only Contract and maintain determinism and provenance in outputs.
		
			
				
	
	
	
		
			1.3 KiB
		
	
	
	
	
	
	
	
			
		
		
	
	
			1.3 KiB
		
	
	
	
	
	
	
	
Entry-Point Runtime — Go
Signals to gather
- Statically linked ELF with 
.note.go.buildid. .gopclntabsection (function name table) orGo build IDstrings.- Minimal dynamic dependencies (often none) and musl/glibc loader differences.
 GODEBUG,GOMAXPROCS,GOENVenvironment variables.- Go module artefacts: 
go.mod,go.sum. 
Implementation notes
- Use ELF parsing to locate 
.note.go.buildid; fallback to scanning the first few MB forGo build ID. - Distinguish from Rust/C by checking 
.dynsymcount, presence of Go-specific section names, and the absence ofGLIBCXX. - For distroless images, rely solely on ELF traits since no package metadata is present.
 - Record binary path and module files as evidence.
 
Evidence & scoring
- Strong boost for 
.note.go.buildidor.gopclntab. - Add evidence for module files or env variables.
 - Penalise binaries with high numbers of shared libraries (likely C/C++).
 
Edge cases
- TinyGo or stripped binaries may lack build IDs—fall back to heuristics (symbol patterns, text section).
 - CGO-enabled binaries include glibc dependencies; still treat as Go but mention CGO in evidence if detected.
 - Supervisors wrapping Go services (e.g., 
envoy) should be handled upstream by wrapper detection.