Skip to content

Commit 3eae3e9

Browse files
build(deps): bump github.com/securego/gosec/v2 from 2.22.11-0.20251204091113-daccba6b93d7 to 2.22.11 (#6258)
Co-authored-by: Fernandez Ludovic <ldez@users.noreply.github.com>
1 parent 54af8f3 commit 3eae3e9

File tree

4 files changed

+34
-31
lines changed

4 files changed

+34
-31
lines changed

.golangci.next.reference.yml

Lines changed: 30 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1496,89 +1496,91 @@ linters:
14961496
# Available rules: https://github.com/securego/gosec#available-rules
14971497
# Default: [] - means include all rules
14981498
includes:
1499-
- G101 # Look for hard coded credentials
1499+
- G101 # Look for hardcoded credentials
15001500
- G102 # Bind to all interfaces
15011501
- G103 # Audit the use of unsafe block
15021502
- G104 # Audit errors not checked
1503-
- G106 # Audit the use of ssh.InsecureIgnoreHostKey
1503+
- G106 # Audit the use of ssh.InsecureIgnoreHostKey function
15041504
- G107 # Url provided to HTTP request as taint input
1505-
- G108 # Profiling endpoint automatically exposed on /debug/pprof
1506-
- G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
1507-
- G110 # Potential DoS vulnerability via decompression bomb
1508-
- G111 # Potential directory traversal
1509-
- G112 # Potential slowloris attack
1505+
- G108 # Profiling endpoint is automatically exposed
1506+
- G109 # Converting strconv.Atoi result to int32/int16
1507+
- G110 # Detect io.Copy instead of io.CopyN when decompression
1508+
- G111 # Detect http.Dir('/') as a potential risk
1509+
- G112 # Detect ReadHeaderTimeout not configured as a potential risk
15101510
- G114 # Use of net/http serve function that has no support for setting timeouts
1511-
- G115 # Potential integer overflow when converting between integer types
1511+
- G115 # Type conversion which leads to integer overflow
1512+
- G116 # Detect Trojan Source attacks using bidirectional Unicode characters
15121513
- G201 # SQL query construction using format string
15131514
- G202 # SQL query construction using string concatenation
15141515
- G203 # Use of unescaped data in HTML templates
15151516
- G204 # Audit use of command execution
15161517
- G301 # Poor file permissions used when creating a directory
1517-
- G302 # Poor file permissions used with chmod
1518+
- G302 # Poor file permissions used when creation file or using chmod
15181519
- G303 # Creating tempfile using a predictable path
15191520
- G304 # File path provided as taint input
1520-
- G305 # File traversal when extracting zip/tar archive
1521-
- G306 # Poor file permissions used when writing to a new file
1521+
- G305 # File path traversal when extracting zip archive
1522+
- G306 # Poor file permissions used when writing to a file
15221523
- G307 # Poor file permissions used when creating a file with os.Create
15231524
- G401 # Detect the usage of MD5 or SHA1
15241525
- G402 # Look for bad TLS connection settings
15251526
- G403 # Ensure minimum RSA key length of 2048 bits
15261527
- G404 # Insecure random number source (rand)
15271528
- G405 # Detect the usage of DES or RC4
1528-
- G406 # Detect the usage of MD4 or RIPEMD160
1529+
- G406 # Detect the usage of deprecated MD4 or RIPEMD160
15291530
- G501 # Import blocklist: crypto/md5
15301531
- G502 # Import blocklist: crypto/des
15311532
- G503 # Import blocklist: crypto/rc4
15321533
- G504 # Import blocklist: net/http/cgi
15331534
- G505 # Import blocklist: crypto/sha1
15341535
- G506 # Import blocklist: golang.org/x/crypto/md4
15351536
- G507 # Import blocklist: golang.org/x/crypto/ripemd160
1536-
- G601 # Implicit memory aliasing of items from a range statement
1537-
- G602 # Slice access out of bounds
1537+
- G601 # Implicit memory aliasing in RangeStmt
1538+
- G602 # Possible slice bounds out of range
15381539

15391540
# To specify a set of rules to explicitly exclude.
15401541
# Available rules: https://github.com/securego/gosec#available-rules
15411542
# Default: []
15421543
excludes:
1543-
- G101 # Look for hard coded credentials
1544+
- G101 # Look for hardcoded credentials
15441545
- G102 # Bind to all interfaces
15451546
- G103 # Audit the use of unsafe block
15461547
- G104 # Audit errors not checked
1547-
- G106 # Audit the use of ssh.InsecureIgnoreHostKey
1548+
- G106 # Audit the use of ssh.InsecureIgnoreHostKey function
15481549
- G107 # Url provided to HTTP request as taint input
1549-
- G108 # Profiling endpoint automatically exposed on /debug/pprof
1550-
- G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
1551-
- G110 # Potential DoS vulnerability via decompression bomb
1552-
- G111 # Potential directory traversal
1553-
- G112 # Potential slowloris attack
1550+
- G108 # Profiling endpoint is automatically exposed
1551+
- G109 # Converting strconv.Atoi result to int32/int16
1552+
- G110 # Detect io.Copy instead of io.CopyN when decompression
1553+
- G111 # Detect http.Dir('/') as a potential risk
1554+
- G112 # Detect ReadHeaderTimeout not configured as a potential risk
15541555
- G114 # Use of net/http serve function that has no support for setting timeouts
1555-
- G115 # Potential integer overflow when converting between integer types
1556+
- G115 # Type conversion which leads to integer overflow
1557+
- G116 # Detect Trojan Source attacks using bidirectional Unicode characters
15561558
- G201 # SQL query construction using format string
15571559
- G202 # SQL query construction using string concatenation
15581560
- G203 # Use of unescaped data in HTML templates
15591561
- G204 # Audit use of command execution
15601562
- G301 # Poor file permissions used when creating a directory
1561-
- G302 # Poor file permissions used with chmod
1563+
- G302 # Poor file permissions used when creation file or using chmod
15621564
- G303 # Creating tempfile using a predictable path
15631565
- G304 # File path provided as taint input
1564-
- G305 # File traversal when extracting zip/tar archive
1565-
- G306 # Poor file permissions used when writing to a new file
1566+
- G305 # File path traversal when extracting zip archive
1567+
- G306 # Poor file permissions used when writing to a file
15661568
- G307 # Poor file permissions used when creating a file with os.Create
15671569
- G401 # Detect the usage of MD5 or SHA1
15681570
- G402 # Look for bad TLS connection settings
15691571
- G403 # Ensure minimum RSA key length of 2048 bits
15701572
- G404 # Insecure random number source (rand)
15711573
- G405 # Detect the usage of DES or RC4
1572-
- G406 # Detect the usage of MD4 or RIPEMD160
1574+
- G406 # Detect the usage of deprecated MD4 or RIPEMD160
15731575
- G501 # Import blocklist: crypto/md5
15741576
- G502 # Import blocklist: crypto/des
15751577
- G503 # Import blocklist: crypto/rc4
15761578
- G504 # Import blocklist: net/http/cgi
15771579
- G505 # Import blocklist: crypto/sha1
15781580
- G506 # Import blocklist: golang.org/x/crypto/md4
15791581
- G507 # Import blocklist: golang.org/x/crypto/ripemd160
1580-
- G601 # Implicit memory aliasing of items from a range statement
1581-
- G602 # Slice access out of bounds
1582+
- G601 # Implicit memory aliasing in RangeStmt
1583+
- G602 # Possible slice bounds out of range
15821584

15831585
# Filter out the issues with a lower severity than the given value.
15841586
# Valid options are: low, medium, high.

go.mod

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ require (
104104
github.com/santhosh-tekuri/jsonschema/v6 v6.0.2
105105
github.com/sashamelentyev/interfacebloat v1.1.0
106106
github.com/sashamelentyev/usestdlibvars v1.29.0
107-
github.com/securego/gosec/v2 v2.22.11-0.20251204091113-daccba6b93d7
107+
github.com/securego/gosec/v2 v2.22.11
108108
github.com/shirou/gopsutil/v4 v4.25.11
109109
github.com/sirupsen/logrus v1.9.3
110110
github.com/sivchari/containedctx v1.0.3

go.sum

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

jsonschema/golangci.next.jsonschema.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -505,6 +505,7 @@
505505
"G112",
506506
"G114",
507507
"G115",
508+
"G116",
508509
"G201",
509510
"G202",
510511
"G203",

0 commit comments

Comments
 (0)