@@ -1496,89 +1496,91 @@ linters:
14961496 # Available rules: https://github.com/securego/gosec#available-rules
14971497 # Default: [] - means include all rules
14981498 includes :
1499- - G101 # Look for hard coded credentials
1499+ - G101 # Look for hardcoded credentials
15001500 - G102 # Bind to all interfaces
15011501 - G103 # Audit the use of unsafe block
15021502 - G104 # Audit errors not checked
1503- - G106 # Audit the use of ssh.InsecureIgnoreHostKey
1503+ - G106 # Audit the use of ssh.InsecureIgnoreHostKey function
15041504 - G107 # Url provided to HTTP request as taint input
1505- - G108 # Profiling endpoint automatically exposed on /debug/pprof
1506- - G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
1507- - G110 # Potential DoS vulnerability via decompression bomb
1508- - G111 # Potential directory traversal
1509- - G112 # Potential slowloris attack
1505+ - G108 # Profiling endpoint is automatically exposed
1506+ - G109 # Converting strconv.Atoi result to int32/int16
1507+ - G110 # Detect io.Copy instead of io.CopyN when decompression
1508+ - G111 # Detect http.Dir('/') as a potential risk
1509+ - G112 # Detect ReadHeaderTimeout not configured as a potential risk
15101510 - G114 # Use of net/http serve function that has no support for setting timeouts
1511- - G115 # Potential integer overflow when converting between integer types
1511+ - G115 # Type conversion which leads to integer overflow
1512+ - G116 # Detect Trojan Source attacks using bidirectional Unicode characters
15121513 - G201 # SQL query construction using format string
15131514 - G202 # SQL query construction using string concatenation
15141515 - G203 # Use of unescaped data in HTML templates
15151516 - G204 # Audit use of command execution
15161517 - G301 # Poor file permissions used when creating a directory
1517- - G302 # Poor file permissions used with chmod
1518+ - G302 # Poor file permissions used when creation file or using chmod
15181519 - G303 # Creating tempfile using a predictable path
15191520 - G304 # File path provided as taint input
1520- - G305 # File traversal when extracting zip/tar archive
1521- - G306 # Poor file permissions used when writing to a new file
1521+ - G305 # File path traversal when extracting zip archive
1522+ - G306 # Poor file permissions used when writing to a file
15221523 - G307 # Poor file permissions used when creating a file with os.Create
15231524 - G401 # Detect the usage of MD5 or SHA1
15241525 - G402 # Look for bad TLS connection settings
15251526 - G403 # Ensure minimum RSA key length of 2048 bits
15261527 - G404 # Insecure random number source (rand)
15271528 - G405 # Detect the usage of DES or RC4
1528- - G406 # Detect the usage of MD4 or RIPEMD160
1529+ - G406 # Detect the usage of deprecated MD4 or RIPEMD160
15291530 - G501 # Import blocklist: crypto/md5
15301531 - G502 # Import blocklist: crypto/des
15311532 - G503 # Import blocklist: crypto/rc4
15321533 - G504 # Import blocklist: net/http/cgi
15331534 - G505 # Import blocklist: crypto/sha1
15341535 - G506 # Import blocklist: golang.org/x/crypto/md4
15351536 - G507 # Import blocklist: golang.org/x/crypto/ripemd160
1536- - G601 # Implicit memory aliasing of items from a range statement
1537- - G602 # Slice access out of bounds
1537+ - G601 # Implicit memory aliasing in RangeStmt
1538+ - G602 # Possible slice bounds out of range
15381539
15391540 # To specify a set of rules to explicitly exclude.
15401541 # Available rules: https://github.com/securego/gosec#available-rules
15411542 # Default: []
15421543 excludes :
1543- - G101 # Look for hard coded credentials
1544+ - G101 # Look for hardcoded credentials
15441545 - G102 # Bind to all interfaces
15451546 - G103 # Audit the use of unsafe block
15461547 - G104 # Audit errors not checked
1547- - G106 # Audit the use of ssh.InsecureIgnoreHostKey
1548+ - G106 # Audit the use of ssh.InsecureIgnoreHostKey function
15481549 - G107 # Url provided to HTTP request as taint input
1549- - G108 # Profiling endpoint automatically exposed on /debug/pprof
1550- - G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
1551- - G110 # Potential DoS vulnerability via decompression bomb
1552- - G111 # Potential directory traversal
1553- - G112 # Potential slowloris attack
1550+ - G108 # Profiling endpoint is automatically exposed
1551+ - G109 # Converting strconv.Atoi result to int32/int16
1552+ - G110 # Detect io.Copy instead of io.CopyN when decompression
1553+ - G111 # Detect http.Dir('/') as a potential risk
1554+ - G112 # Detect ReadHeaderTimeout not configured as a potential risk
15541555 - G114 # Use of net/http serve function that has no support for setting timeouts
1555- - G115 # Potential integer overflow when converting between integer types
1556+ - G115 # Type conversion which leads to integer overflow
1557+ - G116 # Detect Trojan Source attacks using bidirectional Unicode characters
15561558 - G201 # SQL query construction using format string
15571559 - G202 # SQL query construction using string concatenation
15581560 - G203 # Use of unescaped data in HTML templates
15591561 - G204 # Audit use of command execution
15601562 - G301 # Poor file permissions used when creating a directory
1561- - G302 # Poor file permissions used with chmod
1563+ - G302 # Poor file permissions used when creation file or using chmod
15621564 - G303 # Creating tempfile using a predictable path
15631565 - G304 # File path provided as taint input
1564- - G305 # File traversal when extracting zip/tar archive
1565- - G306 # Poor file permissions used when writing to a new file
1566+ - G305 # File path traversal when extracting zip archive
1567+ - G306 # Poor file permissions used when writing to a file
15661568 - G307 # Poor file permissions used when creating a file with os.Create
15671569 - G401 # Detect the usage of MD5 or SHA1
15681570 - G402 # Look for bad TLS connection settings
15691571 - G403 # Ensure minimum RSA key length of 2048 bits
15701572 - G404 # Insecure random number source (rand)
15711573 - G405 # Detect the usage of DES or RC4
1572- - G406 # Detect the usage of MD4 or RIPEMD160
1574+ - G406 # Detect the usage of deprecated MD4 or RIPEMD160
15731575 - G501 # Import blocklist: crypto/md5
15741576 - G502 # Import blocklist: crypto/des
15751577 - G503 # Import blocklist: crypto/rc4
15761578 - G504 # Import blocklist: net/http/cgi
15771579 - G505 # Import blocklist: crypto/sha1
15781580 - G506 # Import blocklist: golang.org/x/crypto/md4
15791581 - G507 # Import blocklist: golang.org/x/crypto/ripemd160
1580- - G601 # Implicit memory aliasing of items from a range statement
1581- - G602 # Slice access out of bounds
1582+ - G601 # Implicit memory aliasing in RangeStmt
1583+ - G602 # Possible slice bounds out of range
15821584
15831585 # Filter out the issues with a lower severity than the given value.
15841586 # Valid options are: low, medium, high.
0 commit comments