This strike exploits a command execution vulnerability in Google Goland client. The vulnerability is due to insufficient sanitization of user input by the go get command. An authenticated attacker can entice the client to use 'go get' on a malicious URL, a successful exploitation could results in a command injection on the target user. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021. Other reference:None