@@ -725,77 +725,79 @@ linters-settings:
725725 # Available rules: https://github.com/securego/gosec#available-rules
726726 # Default: [] - means include all rules
727727 includes :
728- - G101
729- - G102
730- - G103
731- - G104
732- - G106
733- - G107
734- - G108
735- - G109
736- - G110
737- - G111
738- - G112
739- - G113
740- - G201
741- - G202
742- - G203
743- - G204
744- - G301
745- - G302
746- - G303
747- - G304
748- - G305
749- - G306
750- - G307
751- - G401
752- - G402
753- - G403
754- - G404
755- - G501
756- - G502
757- - G503
758- - G504
759- - G505
760- - G601
728+ - G101 # Look for hard coded credentials
729+ - G102 # Bind to all interfaces
730+ - G103 # Audit the use of unsafe block
731+ - G104 # Audit errors not checked
732+ - G106 # Audit the use of ssh.InsecureIgnoreHostKey
733+ - G107 # Url provided to HTTP request as taint input
734+ - G108 # Profiling endpoint automatically exposed on /debug/pprof
735+ - G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
736+ - G110 # Potential DoS vulnerability via decompression bomb
737+ - G111 # Potential directory traversal
738+ - G112 # Potential slowloris attack
739+ - G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772)
740+ - G114 # Use of net/http serve function that has no support for setting timeouts
741+ - G201 # SQL query construction using format string
742+ - G202 # SQL query construction using string concatenation
743+ - G203 # Use of unescaped data in HTML templates
744+ - G204 # Audit use of command execution
745+ - G301 # Poor file permissions used when creating a directory
746+ - G302 # Poor file permissions used with chmod
747+ - G303 # Creating tempfile using a predictable path
748+ - G304 # File path provided as taint input
749+ - G305 # File traversal when extracting zip/tar archive
750+ - G306 # Poor file permissions used when writing to a new file
751+ - G307 # Deferring a method which returns an error
752+ - G401 # Detect the usage of DES, RC4, MD5 or SHA1
753+ - G402 # Look for bad TLS connection settings
754+ - G403 # Ensure minimum RSA key length of 2048 bits
755+ - G404 # Insecure random number source (rand)
756+ - G501 # Import blocklist: crypto/md5
757+ - G502 # Import blocklist: crypto/des
758+ - G503 # Import blocklist: crypto/rc4
759+ - G504 # Import blocklist: net/http/cgi
760+ - G505 # Import blocklist: crypto/sha1
761+ - G601 # Implicit memory aliasing of items from a range statement
761762
762763 # To specify a set of rules to explicitly exclude.
763764 # Available rules: https://github.com/securego/gosec#available-rules
764765 # Default: []
765766 excludes :
766- - G101
767- - G102
768- - G103
769- - G104
770- - G106
771- - G107
772- - G108
773- - G109
774- - G110
775- - G111
776- - G112
777- - G113
778- - G201
779- - G202
780- - G203
781- - G204
782- - G301
783- - G302
784- - G303
785- - G304
786- - G305
787- - G306
788- - G307
789- - G401
790- - G402
791- - G403
792- - G404
793- - G501
794- - G502
795- - G503
796- - G504
797- - G505
798- - G601
767+ - G101 # Look for hard coded credentials
768+ - G102 # Bind to all interfaces
769+ - G103 # Audit the use of unsafe block
770+ - G104 # Audit errors not checked
771+ - G106 # Audit the use of ssh.InsecureIgnoreHostKey
772+ - G107 # Url provided to HTTP request as taint input
773+ - G108 # Profiling endpoint automatically exposed on /debug/pprof
774+ - G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32
775+ - G110 # Potential DoS vulnerability via decompression bomb
776+ - G111 # Potential directory traversal
777+ - G112 # Potential slowloris attack
778+ - G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772)
779+ - G114 # Use of net/http serve function that has no support for setting timeouts
780+ - G201 # SQL query construction using format string
781+ - G202 # SQL query construction using string concatenation
782+ - G203 # Use of unescaped data in HTML templates
783+ - G204 # Audit use of command execution
784+ - G301 # Poor file permissions used when creating a directory
785+ - G302 # Poor file permissions used with chmod
786+ - G303 # Creating tempfile using a predictable path
787+ - G304 # File path provided as taint input
788+ - G305 # File traversal when extracting zip/tar archive
789+ - G306 # Poor file permissions used when writing to a new file
790+ - G307 # Deferring a method which returns an error
791+ - G401 # Detect the usage of DES, RC4, MD5 or SHA1
792+ - G402 # Look for bad TLS connection settings
793+ - G403 # Ensure minimum RSA key length of 2048 bits
794+ - G404 # Insecure random number source (rand)
795+ - G501 # Import blocklist: crypto/md5
796+ - G502 # Import blocklist: crypto/des
797+ - G503 # Import blocklist: crypto/rc4
798+ - G504 # Import blocklist: net/http/cgi
799+ - G505 # Import blocklist: crypto/sha1
800+ - G601 # Implicit memory aliasing of items from a range statement
799801
800802 # Exclude generated files
801803 # Default: false
0 commit comments