Skip to content

Commit 160693d

Browse files
committed
chore: update implementation
1 parent 097ce90 commit 160693d

File tree

2 files changed

+31
-28
lines changed

2 files changed

+31
-28
lines changed

.golangci.next.reference.yml

Lines changed: 30 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1493,89 +1493,91 @@ linters:
14931493
# Available rules: https://github.com/securego/gosec#available-rules
14941494
# Default: [] - means include all rules
14951495
includes:
1496-
- G101 # Look for hard coded credentials
1496+
- G101 # Look for hardcoded credentials
14971497
- G102 # Bind to all interfaces
14981498
- G103 # Audit the use of unsafe block
14991499
- G104 # Audit errors not checked
1500-
- G106 # Audit the use of ssh.InsecureIgnoreHostKey
1500+
- G106 # Audit the use of ssh.InsecureIgnoreHostKey function
15011501
- G107 # Url provided to HTTP request as taint input
1502-
- G108 # Profiling endpoint automatically exposed on /debug/pprof
1503-
- G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
1504-
- G110 # Potential DoS vulnerability via decompression bomb
1505-
- G111 # Potential directory traversal
1506-
- G112 # Potential slowloris attack
1502+
- G108 # Profiling endpoint is automatically exposed
1503+
- G109 # Converting strconv.Atoi result to int32/int16
1504+
- G110 # Detect io.Copy instead of io.CopyN when decompression
1505+
- G111 # Detect http.Dir('/') as a potential risk
1506+
- G112 # Detect ReadHeaderTimeout not configured as a potential risk
15071507
- G114 # Use of net/http serve function that has no support for setting timeouts
1508-
- G115 # Potential integer overflow when converting between integer types
1508+
- G115 # Type conversion which leads to integer overflow
1509+
- G116 # Detect Trojan Source attacks using bidirectional Unicode characters
15091510
- G201 # SQL query construction using format string
15101511
- G202 # SQL query construction using string concatenation
15111512
- G203 # Use of unescaped data in HTML templates
15121513
- G204 # Audit use of command execution
15131514
- G301 # Poor file permissions used when creating a directory
1514-
- G302 # Poor file permissions used with chmod
1515+
- G302 # Poor file permissions used when creation file or using chmod
15151516
- G303 # Creating tempfile using a predictable path
15161517
- G304 # File path provided as taint input
1517-
- G305 # File traversal when extracting zip/tar archive
1518-
- G306 # Poor file permissions used when writing to a new file
1518+
- G305 # File path traversal when extracting zip archive
1519+
- G306 # Poor file permissions used when writing to a file
15191520
- G307 # Poor file permissions used when creating a file with os.Create
15201521
- G401 # Detect the usage of MD5 or SHA1
15211522
- G402 # Look for bad TLS connection settings
15221523
- G403 # Ensure minimum RSA key length of 2048 bits
15231524
- G404 # Insecure random number source (rand)
15241525
- G405 # Detect the usage of DES or RC4
1525-
- G406 # Detect the usage of MD4 or RIPEMD160
1526+
- G406 # Detect the usage of deprecated MD4 or RIPEMD160
15261527
- G501 # Import blocklist: crypto/md5
15271528
- G502 # Import blocklist: crypto/des
15281529
- G503 # Import blocklist: crypto/rc4
15291530
- G504 # Import blocklist: net/http/cgi
15301531
- G505 # Import blocklist: crypto/sha1
15311532
- G506 # Import blocklist: golang.org/x/crypto/md4
15321533
- G507 # Import blocklist: golang.org/x/crypto/ripemd160
1533-
- G601 # Implicit memory aliasing of items from a range statement
1534-
- G602 # Slice access out of bounds
1534+
- G601 # Implicit memory aliasing in RangeStmt
1535+
- G602 # Possible slice bounds out of range
15351536

15361537
# To specify a set of rules to explicitly exclude.
15371538
# Available rules: https://github.com/securego/gosec#available-rules
15381539
# Default: []
15391540
excludes:
1540-
- G101 # Look for hard coded credentials
1541+
- G101 # Look for hardcoded credentials
15411542
- G102 # Bind to all interfaces
15421543
- G103 # Audit the use of unsafe block
15431544
- G104 # Audit errors not checked
1544-
- G106 # Audit the use of ssh.InsecureIgnoreHostKey
1545+
- G106 # Audit the use of ssh.InsecureIgnoreHostKey function
15451546
- G107 # Url provided to HTTP request as taint input
1546-
- G108 # Profiling endpoint automatically exposed on /debug/pprof
1547-
- G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
1548-
- G110 # Potential DoS vulnerability via decompression bomb
1549-
- G111 # Potential directory traversal
1550-
- G112 # Potential slowloris attack
1547+
- G108 # Profiling endpoint is automatically exposed
1548+
- G109 # Converting strconv.Atoi result to int32/int16
1549+
- G110 # Detect io.Copy instead of io.CopyN when decompression
1550+
- G111 # Detect http.Dir('/') as a potential risk
1551+
- G112 # Detect ReadHeaderTimeout not configured as a potential risk
15511552
- G114 # Use of net/http serve function that has no support for setting timeouts
1552-
- G115 # Potential integer overflow when converting between integer types
1553+
- G115 # Type conversion which leads to integer overflow
1554+
- G116 # Detect Trojan Source attacks using bidirectional Unicode characters
15531555
- G201 # SQL query construction using format string
15541556
- G202 # SQL query construction using string concatenation
15551557
- G203 # Use of unescaped data in HTML templates
15561558
- G204 # Audit use of command execution
15571559
- G301 # Poor file permissions used when creating a directory
1558-
- G302 # Poor file permissions used with chmod
1560+
- G302 # Poor file permissions used when creation file or using chmod
15591561
- G303 # Creating tempfile using a predictable path
15601562
- G304 # File path provided as taint input
1561-
- G305 # File traversal when extracting zip/tar archive
1562-
- G306 # Poor file permissions used when writing to a new file
1563+
- G305 # File path traversal when extracting zip archive
1564+
- G306 # Poor file permissions used when writing to a file
15631565
- G307 # Poor file permissions used when creating a file with os.Create
15641566
- G401 # Detect the usage of MD5 or SHA1
15651567
- G402 # Look for bad TLS connection settings
15661568
- G403 # Ensure minimum RSA key length of 2048 bits
15671569
- G404 # Insecure random number source (rand)
15681570
- G405 # Detect the usage of DES or RC4
1569-
- G406 # Detect the usage of MD4 or RIPEMD160
1571+
- G406 # Detect the usage of deprecated MD4 or RIPEMD160
15701572
- G501 # Import blocklist: crypto/md5
15711573
- G502 # Import blocklist: crypto/des
15721574
- G503 # Import blocklist: crypto/rc4
15731575
- G504 # Import blocklist: net/http/cgi
15741576
- G505 # Import blocklist: crypto/sha1
15751577
- G506 # Import blocklist: golang.org/x/crypto/md4
15761578
- G507 # Import blocklist: golang.org/x/crypto/ripemd160
1577-
- G601 # Implicit memory aliasing of items from a range statement
1578-
- G602 # Slice access out of bounds
1579+
- G601 # Implicit memory aliasing in RangeStmt
1580+
- G602 # Possible slice bounds out of range
15791581

15801582
# Filter out the issues with a lower severity than the given value.
15811583
# Valid options are: low, medium, high.

jsonschema/golangci.next.jsonschema.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -505,6 +505,7 @@
505505
"G112",
506506
"G114",
507507
"G115",
508+
"G116",
508509
"G201",
509510
"G202",
510511
"G203",

0 commit comments

Comments
 (0)