Traversal-resistant file APIs (The Go Blog)
Damien Neil has written an article for the Go Blog about pathtraversal vulnerabilities and the os.Root API added in Go 1.24 to help preventthem.
Root permits relative path components and symlinks that do not escapethe root. For example, root.Open("a/../b") is permitted. Filenames areresolved using the semantics of the local platform: On Unix systems,this will follow any symlink in "a" (so long as that link does notescape the root); while on Windows systems this will open "b" (even if"a" does not exist).