-
Notifications
You must be signed in to change notification settings - Fork 170
Open
Labels
goPull requests that update Go codePull requests that update Go codegood first issueGood for newcomersGood for newcomershacktoberfest
Description
Currently we have only one (1) gosec rule enabled in golangci-lint config.
Lines 51 to 53 in 334e6b7
| gosec: | |
| includes: | |
| - G601 |
Ideally we should enable all of them. Every PR should fix one rule. There is a chance that some rules are already fixed and we only need to enable them. After including new rule, please ensure make golangci-lint is passing if there are errors please fix them.
- G101: Look for hard coded credentials feat: added gosec G101 #3566
- G102: Bind to all interfaces feat: added gosec G102 #3567
- G103: Audit the use of unsafe block feat: added gosec G103 #3568
- G104: Audit errors not checked Enable gosec G104 test #3936
- G106: Audit the use of ssh.InsecureIgnoreHostKey Enable gosec rules #3677
- G107: Url provided to HTTP request as taint input
- G108: Profiling endpoint automatically exposed on /debug/pprof Enable gosec rules #3677
- G109: Potential Integer overflow made by strconv.Atoi result conversion to int16/32 Enable gosec rules #3677
- G110: Potential DoS vulnerability via decompression bomb
- G111: Potential directory traversal 🚨 G111 gosec rule enabled #3629
- G112: Potential slowloris attack
- G113: Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772) 🚨 G113 gosec rule enabled #3631
- G114: Use of net/http serve function that has no support for setting timeouts
- G201: SQL query construction using format string Enable gosec rules #3677
- G202: SQL query construction using string concatenation Enable gosec rules #3677
- G203: Use of unescaped data in HTML templates Enable gosec rules #3677
- G204: Audit use of command execution
- G301: Poor file permissions used when creating a directory
- G302: Poor file permissions used with chmod
- G303: Creating tempfile using a predictable path 🚨 G303 gosec rule enabled #3560
- G304: File path provided as taint input
- G305: File traversal when extracting zip/tar archive
- G306: Poor file permissions used when writing to a new file
- G307: Deferring a method which returns an error Enable gosec rules #3677
- G401: Detect the usage of DES, RC4, MD5 or SHA1
- G402: Look for bad TLS connection settings
- G403: Ensure minimum RSA key length of 2048 bits Enable gosec rules #3677
- G404: Insecure random number source (rand)
- G501: Import blocklist: crypto/md5
- G502: Import blocklist: crypto/des Enable gosec rules #3677
- G503: Import blocklist: crypto/rc4 Enable gosec rules #3677
- G504: Import blocklist: net/http/cgi Enable gosec rules #3677
- G505: Import blocklist: crypto/sha1
- G601: Implicit memory aliasing of items from a range statement
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
goPull requests that update Go codePull requests that update Go codegood first issueGood for newcomersGood for newcomershacktoberfest