Skip to content

Commit 6a41fb9

Browse files
dependabot[bot]ldez
authored andcommitted
build(deps): bump github.com/securego/gosec/v2 from 2.12.0 to 2.13.1 (#3119)
Co-authored-by: Fernandez Ludovic <[email protected]>
1 parent 2640796 commit 6a41fb9

File tree

3 files changed

+72
-323
lines changed

3 files changed

+72
-323
lines changed

.golangci.reference.yml

+68-66
Original file line numberDiff line numberDiff line change
@@ -725,77 +725,79 @@ linters-settings:
725725
# Available rules: https://github.com/securego/gosec#available-rules
726726
# Default: [] - means include all rules
727727
includes:
728-
- G101
729-
- G102
730-
- G103
731-
- G104
732-
- G106
733-
- G107
734-
- G108
735-
- G109
736-
- G110
737-
- G111
738-
- G112
739-
- G113
740-
- G201
741-
- G202
742-
- G203
743-
- G204
744-
- G301
745-
- G302
746-
- G303
747-
- G304
748-
- G305
749-
- G306
750-
- G307
751-
- G401
752-
- G402
753-
- G403
754-
- G404
755-
- G501
756-
- G502
757-
- G503
758-
- G504
759-
- G505
760-
- G601
728+
- G101 # Look for hard coded credentials
729+
- G102 # Bind to all interfaces
730+
- G103 # Audit the use of unsafe block
731+
- G104 # Audit errors not checked
732+
- G106 # Audit the use of ssh.InsecureIgnoreHostKey
733+
- G107 # Url provided to HTTP request as taint input
734+
- G108 # Profiling endpoint automatically exposed on /debug/pprof
735+
- G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
736+
- G110 # Potential DoS vulnerability via decompression bomb
737+
- G111 # Potential directory traversal
738+
- G112 # Potential slowloris attack
739+
- G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772)
740+
- G114 # Use of net/http serve function that has no support for setting timeouts
741+
- G201 # SQL query construction using format string
742+
- G202 # SQL query construction using string concatenation
743+
- G203 # Use of unescaped data in HTML templates
744+
- G204 # Audit use of command execution
745+
- G301 # Poor file permissions used when creating a directory
746+
- G302 # Poor file permissions used with chmod
747+
- G303 # Creating tempfile using a predictable path
748+
- G304 # File path provided as taint input
749+
- G305 # File traversal when extracting zip/tar archive
750+
- G306 # Poor file permissions used when writing to a new file
751+
- G307 # Deferring a method which returns an error
752+
- G401 # Detect the usage of DES, RC4, MD5 or SHA1
753+
- G402 # Look for bad TLS connection settings
754+
- G403 # Ensure minimum RSA key length of 2048 bits
755+
- G404 # Insecure random number source (rand)
756+
- G501 # Import blocklist: crypto/md5
757+
- G502 # Import blocklist: crypto/des
758+
- G503 # Import blocklist: crypto/rc4
759+
- G504 # Import blocklist: net/http/cgi
760+
- G505 # Import blocklist: crypto/sha1
761+
- G601 # Implicit memory aliasing of items from a range statement
761762

762763
# To specify a set of rules to explicitly exclude.
763764
# Available rules: https://github.com/securego/gosec#available-rules
764765
# Default: []
765766
excludes:
766-
- G101
767-
- G102
768-
- G103
769-
- G104
770-
- G106
771-
- G107
772-
- G108
773-
- G109
774-
- G110
775-
- G111
776-
- G112
777-
- G113
778-
- G201
779-
- G202
780-
- G203
781-
- G204
782-
- G301
783-
- G302
784-
- G303
785-
- G304
786-
- G305
787-
- G306
788-
- G307
789-
- G401
790-
- G402
791-
- G403
792-
- G404
793-
- G501
794-
- G502
795-
- G503
796-
- G504
797-
- G505
798-
- G601
767+
- G101 # Look for hard coded credentials
768+
- G102 # Bind to all interfaces
769+
- G103 # Audit the use of unsafe block
770+
- G104 # Audit errors not checked
771+
- G106 # Audit the use of ssh.InsecureIgnoreHostKey
772+
- G107 # Url provided to HTTP request as taint input
773+
- G108 # Profiling endpoint automatically exposed on /debug/pprof
774+
- G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
775+
- G110 # Potential DoS vulnerability via decompression bomb
776+
- G111 # Potential directory traversal
777+
- G112 # Potential slowloris attack
778+
- G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772)
779+
- G114 # Use of net/http serve function that has no support for setting timeouts
780+
- G201 # SQL query construction using format string
781+
- G202 # SQL query construction using string concatenation
782+
- G203 # Use of unescaped data in HTML templates
783+
- G204 # Audit use of command execution
784+
- G301 # Poor file permissions used when creating a directory
785+
- G302 # Poor file permissions used with chmod
786+
- G303 # Creating tempfile using a predictable path
787+
- G304 # File path provided as taint input
788+
- G305 # File traversal when extracting zip/tar archive
789+
- G306 # Poor file permissions used when writing to a new file
790+
- G307 # Deferring a method which returns an error
791+
- G401 # Detect the usage of DES, RC4, MD5 or SHA1
792+
- G402 # Look for bad TLS connection settings
793+
- G403 # Ensure minimum RSA key length of 2048 bits
794+
- G404 # Insecure random number source (rand)
795+
- G501 # Import blocklist: crypto/md5
796+
- G502 # Import blocklist: crypto/des
797+
- G503 # Import blocklist: crypto/rc4
798+
- G504 # Import blocklist: net/http/cgi
799+
- G505 # Import blocklist: crypto/sha1
800+
- G601 # Implicit memory aliasing of items from a range statement
799801

800802
# Exclude generated files
801803
# Default: false

go.mod

+1-1
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ require (
7575
github.com/ryanrolds/sqlclosecheck v0.3.0
7676
github.com/sanposhiho/wastedassign/v2 v2.0.6
7777
github.com/sashamelentyev/usestdlibvars v1.10.0
78-
github.com/securego/gosec/v2 v2.12.0
78+
github.com/securego/gosec/v2 v2.13.1
7979
github.com/shazow/go-diff v0.0.0-20160112020656-b6b7b6733b8c
8080
github.com/shirou/gopsutil/v3 v3.22.7
8181
github.com/sirupsen/logrus v1.9.0

0 commit comments

Comments
 (0)