Looking through the github repo for duplicacy, it appears that a lot of duplicacy’s dependencies are very out-of-date. Just an example, the latest version of klauspost/compress is currently at v1.18.3 (incidentally, v.1.18.3 fixes a CVE). Duplicacy is using 1.16.3, released almost 3 years ago.
klauspost/reedsolomon latest is at v1.13.0. Duplicacy is using v1.9.9, from May 2020, almost 6 years ago.
The last commit in duplicacy’s github repo was 9 months ago. Given that some of its dependencies have had CVE fixes in the years since they were last updated, this makes me think duplicacy is starting to become abandonware the longer it goes without any updates. Yes, it currently works and works well, and I get that there are arguments to be made of “if-it-ain’t-broke…”.
However we have seen time and time again that that is precisely the attitude that sees out-of-date software get exploited by bad actors. Yes, keeping dependencies up-to-date can sometimes introduce more things to fix and do, but that is the price to be paid to keep up with security fixes that are discovered on a continual and rolling basis.
This is especially confusing to me when it comes to dependencies, as there are github bots that can do this maintenance work for you. I really don’t see a particularly good reason that duplicacy should be depending on 6-year-old go modules (that have had CVE fixes since they were last pulled into duplicacy).
I can’t speak for others, but I know it would give me much more confidence in continuing to use and recommend duplicacy if I knew it was pulling in upstream security fixes, rather than needlessly resting on 6-year-old dependencies.


