@@ -725,77 +725,79 @@ linters-settings:
725
725
# Available rules: https://github.com/securego/gosec#available-rules
726
726
# Default: [] - means include all rules
727
727
includes :
728
- - G101
729
- - G102
730
- - G103
731
- - G104
732
- - G106
733
- - G107
734
- - G108
735
- - G109
736
- - G110
737
- - G111
738
- - G112
739
- - G113
740
- - G201
741
- - G202
742
- - G203
743
- - G204
744
- - G301
745
- - G302
746
- - G303
747
- - G304
748
- - G305
749
- - G306
750
- - G307
751
- - G401
752
- - G402
753
- - G403
754
- - G404
755
- - G501
756
- - G502
757
- - G503
758
- - G504
759
- - G505
760
- - G601
728
+ - G101 # Look for hard coded credentials
729
+ - G102 # Bind to all interfaces
730
+ - G103 # Audit the use of unsafe block
731
+ - G104 # Audit errors not checked
732
+ - G106 # Audit the use of ssh.InsecureIgnoreHostKey
733
+ - G107 # Url provided to HTTP request as taint input
734
+ - G108 # Profiling endpoint automatically exposed on /debug/pprof
735
+ - G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
736
+ - G110 # Potential DoS vulnerability via decompression bomb
737
+ - G111 # Potential directory traversal
738
+ - G112 # Potential slowloris attack
739
+ - G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772)
740
+ - G114 # Use of net/http serve function that has no support for setting timeouts
741
+ - G201 # SQL query construction using format string
742
+ - G202 # SQL query construction using string concatenation
743
+ - G203 # Use of unescaped data in HTML templates
744
+ - G204 # Audit use of command execution
745
+ - G301 # Poor file permissions used when creating a directory
746
+ - G302 # Poor file permissions used with chmod
747
+ - G303 # Creating tempfile using a predictable path
748
+ - G304 # File path provided as taint input
749
+ - G305 # File traversal when extracting zip/tar archive
750
+ - G306 # Poor file permissions used when writing to a new file
751
+ - G307 # Deferring a method which returns an error
752
+ - G401 # Detect the usage of DES, RC4, MD5 or SHA1
753
+ - G402 # Look for bad TLS connection settings
754
+ - G403 # Ensure minimum RSA key length of 2048 bits
755
+ - G404 # Insecure random number source (rand)
756
+ - G501 # Import blocklist: crypto/md5
757
+ - G502 # Import blocklist: crypto/des
758
+ - G503 # Import blocklist: crypto/rc4
759
+ - G504 # Import blocklist: net/http/cgi
760
+ - G505 # Import blocklist: crypto/sha1
761
+ - G601 # Implicit memory aliasing of items from a range statement
761
762
762
763
# To specify a set of rules to explicitly exclude.
763
764
# Available rules: https://github.com/securego/gosec#available-rules
764
765
# Default: []
765
766
excludes :
766
- - G101
767
- - G102
768
- - G103
769
- - G104
770
- - G106
771
- - G107
772
- - G108
773
- - G109
774
- - G110
775
- - G111
776
- - G112
777
- - G113
778
- - G201
779
- - G202
780
- - G203
781
- - G204
782
- - G301
783
- - G302
784
- - G303
785
- - G304
786
- - G305
787
- - G306
788
- - G307
789
- - G401
790
- - G402
791
- - G403
792
- - G404
793
- - G501
794
- - G502
795
- - G503
796
- - G504
797
- - G505
798
- - G601
767
+ - G101 # Look for hard coded credentials
768
+ - G102 # Bind to all interfaces
769
+ - G103 # Audit the use of unsafe block
770
+ - G104 # Audit errors not checked
771
+ - G106 # Audit the use of ssh.InsecureIgnoreHostKey
772
+ - G107 # Url provided to HTTP request as taint input
773
+ - G108 # Profiling endpoint automatically exposed on /debug/pprof
774
+ - G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
775
+ - G110 # Potential DoS vulnerability via decompression bomb
776
+ - G111 # Potential directory traversal
777
+ - G112 # Potential slowloris attack
778
+ - G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772)
779
+ - G114 # Use of net/http serve function that has no support for setting timeouts
780
+ - G201 # SQL query construction using format string
781
+ - G202 # SQL query construction using string concatenation
782
+ - G203 # Use of unescaped data in HTML templates
783
+ - G204 # Audit use of command execution
784
+ - G301 # Poor file permissions used when creating a directory
785
+ - G302 # Poor file permissions used with chmod
786
+ - G303 # Creating tempfile using a predictable path
787
+ - G304 # File path provided as taint input
788
+ - G305 # File traversal when extracting zip/tar archive
789
+ - G306 # Poor file permissions used when writing to a new file
790
+ - G307 # Deferring a method which returns an error
791
+ - G401 # Detect the usage of DES, RC4, MD5 or SHA1
792
+ - G402 # Look for bad TLS connection settings
793
+ - G403 # Ensure minimum RSA key length of 2048 bits
794
+ - G404 # Insecure random number source (rand)
795
+ - G501 # Import blocklist: crypto/md5
796
+ - G502 # Import blocklist: crypto/des
797
+ - G503 # Import blocklist: crypto/rc4
798
+ - G504 # Import blocklist: net/http/cgi
799
+ - G505 # Import blocklist: crypto/sha1
800
+ - G601 # Implicit memory aliasing of items from a range statement
799
801
800
802
# Exclude generated files
801
803
# Default: false
0 commit comments