@@ -1493,89 +1493,91 @@ linters:
14931493 # Available rules: https://github.com/securego/gosec#available-rules
14941494 # Default: [] - means include all rules
14951495 includes :
1496- - G101 # Look for hard coded credentials
1496+ - G101 # Look for hardcoded credentials
14971497 - G102 # Bind to all interfaces
14981498 - G103 # Audit the use of unsafe block
14991499 - G104 # Audit errors not checked
1500- - G106 # Audit the use of ssh.InsecureIgnoreHostKey
1500+ - G106 # Audit the use of ssh.InsecureIgnoreHostKey function
15011501 - G107 # Url provided to HTTP request as taint input
1502- - G108 # Profiling endpoint automatically exposed on /debug/pprof
1503- - G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
1504- - G110 # Potential DoS vulnerability via decompression bomb
1505- - G111 # Potential directory traversal
1506- - G112 # Potential slowloris attack
1502+ - G108 # Profiling endpoint is automatically exposed
1503+ - G109 # Converting strconv.Atoi result to int32/int16
1504+ - G110 # Detect io.Copy instead of io.CopyN when decompression
1505+ - G111 # Detect http.Dir('/') as a potential risk
1506+ - G112 # Detect ReadHeaderTimeout not configured as a potential risk
15071507 - G114 # Use of net/http serve function that has no support for setting timeouts
1508- - G115 # Potential integer overflow when converting between integer types
1508+ - G115 # Type conversion which leads to integer overflow
1509+ - G116 # Detect Trojan Source attacks using bidirectional Unicode characters
15091510 - G201 # SQL query construction using format string
15101511 - G202 # SQL query construction using string concatenation
15111512 - G203 # Use of unescaped data in HTML templates
15121513 - G204 # Audit use of command execution
15131514 - G301 # Poor file permissions used when creating a directory
1514- - G302 # Poor file permissions used with chmod
1515+ - G302 # Poor file permissions used when creation file or using chmod
15151516 - G303 # Creating tempfile using a predictable path
15161517 - G304 # File path provided as taint input
1517- - G305 # File traversal when extracting zip/tar archive
1518- - G306 # Poor file permissions used when writing to a new file
1518+ - G305 # File path traversal when extracting zip archive
1519+ - G306 # Poor file permissions used when writing to a file
15191520 - G307 # Poor file permissions used when creating a file with os.Create
15201521 - G401 # Detect the usage of MD5 or SHA1
15211522 - G402 # Look for bad TLS connection settings
15221523 - G403 # Ensure minimum RSA key length of 2048 bits
15231524 - G404 # Insecure random number source (rand)
15241525 - G405 # Detect the usage of DES or RC4
1525- - G406 # Detect the usage of MD4 or RIPEMD160
1526+ - G406 # Detect the usage of deprecated MD4 or RIPEMD160
15261527 - G501 # Import blocklist: crypto/md5
15271528 - G502 # Import blocklist: crypto/des
15281529 - G503 # Import blocklist: crypto/rc4
15291530 - G504 # Import blocklist: net/http/cgi
15301531 - G505 # Import blocklist: crypto/sha1
15311532 - G506 # Import blocklist: golang.org/x/crypto/md4
15321533 - G507 # Import blocklist: golang.org/x/crypto/ripemd160
1533- - G601 # Implicit memory aliasing of items from a range statement
1534- - G602 # Slice access out of bounds
1534+ - G601 # Implicit memory aliasing in RangeStmt
1535+ - G602 # Possible slice bounds out of range
15351536
15361537 # To specify a set of rules to explicitly exclude.
15371538 # Available rules: https://github.com/securego/gosec#available-rules
15381539 # Default: []
15391540 excludes :
1540- - G101 # Look for hard coded credentials
1541+ - G101 # Look for hardcoded credentials
15411542 - G102 # Bind to all interfaces
15421543 - G103 # Audit the use of unsafe block
15431544 - G104 # Audit errors not checked
1544- - G106 # Audit the use of ssh.InsecureIgnoreHostKey
1545+ - G106 # Audit the use of ssh.InsecureIgnoreHostKey function
15451546 - G107 # Url provided to HTTP request as taint input
1546- - G108 # Profiling endpoint automatically exposed on /debug/pprof
1547- - G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
1548- - G110 # Potential DoS vulnerability via decompression bomb
1549- - G111 # Potential directory traversal
1550- - G112 # Potential slowloris attack
1547+ - G108 # Profiling endpoint is automatically exposed
1548+ - G109 # Converting strconv.Atoi result to int32/int16
1549+ - G110 # Detect io.Copy instead of io.CopyN when decompression
1550+ - G111 # Detect http.Dir('/') as a potential risk
1551+ - G112 # Detect ReadHeaderTimeout not configured as a potential risk
15511552 - G114 # Use of net/http serve function that has no support for setting timeouts
1552- - G115 # Potential integer overflow when converting between integer types
1553+ - G115 # Type conversion which leads to integer overflow
1554+ - G116 # Detect Trojan Source attacks using bidirectional Unicode characters
15531555 - G201 # SQL query construction using format string
15541556 - G202 # SQL query construction using string concatenation
15551557 - G203 # Use of unescaped data in HTML templates
15561558 - G204 # Audit use of command execution
15571559 - G301 # Poor file permissions used when creating a directory
1558- - G302 # Poor file permissions used with chmod
1560+ - G302 # Poor file permissions used when creation file or using chmod
15591561 - G303 # Creating tempfile using a predictable path
15601562 - G304 # File path provided as taint input
1561- - G305 # File traversal when extracting zip/tar archive
1562- - G306 # Poor file permissions used when writing to a new file
1563+ - G305 # File path traversal when extracting zip archive
1564+ - G306 # Poor file permissions used when writing to a file
15631565 - G307 # Poor file permissions used when creating a file with os.Create
15641566 - G401 # Detect the usage of MD5 or SHA1
15651567 - G402 # Look for bad TLS connection settings
15661568 - G403 # Ensure minimum RSA key length of 2048 bits
15671569 - G404 # Insecure random number source (rand)
15681570 - G405 # Detect the usage of DES or RC4
1569- - G406 # Detect the usage of MD4 or RIPEMD160
1571+ - G406 # Detect the usage of deprecated MD4 or RIPEMD160
15701572 - G501 # Import blocklist: crypto/md5
15711573 - G502 # Import blocklist: crypto/des
15721574 - G503 # Import blocklist: crypto/rc4
15731575 - G504 # Import blocklist: net/http/cgi
15741576 - G505 # Import blocklist: crypto/sha1
15751577 - G506 # Import blocklist: golang.org/x/crypto/md4
15761578 - G507 # Import blocklist: golang.org/x/crypto/ripemd160
1577- - G601 # Implicit memory aliasing of items from a range statement
1578- - G602 # Slice access out of bounds
1579+ - G601 # Implicit memory aliasing in RangeStmt
1580+ - G602 # Possible slice bounds out of range
15791581
15801582 # Filter out the issues with a lower severity than the given value.
15811583 # Valid options are: low, medium, high.
0 commit comments