Lock agents repo map on Get #24
go_dev.yml
on: push
Code Quality Scan & Build: Development Work
1m 37s
Annotations
3 errors, 6 warnings, and 2 notices
Code Quality Scan & Build: Development Work
gob.Coder.Decode calls gob.Decoder.Decode
|
Code Quality Scan & Build: Development Work
Process completed with exit code 3.
|
Vulnerable declared dependency:
go.mod#L27
Dependency go:golang.org/x/crypto:v0.22.0 is vulnerable, safe version 0.23.0
* [CVE-2023-42818](https://devhub.checkmarx.com/cve-details/CVE-2023-42818?utm_source=jetbrains&utm_medium=referral) 9.8 Improper Restriction of Excessive Authentication Attempts vulnerability with High severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Code Quality Scan & Build: Development Work
The following actions use a deprecated Node.js version and will be forced to run on node20: actions/setup-go@v4. For more info: https://github.blog/changelog/2024-03-07-github-actions-all-actions-will-run-on-node20-instead-of-node16-by-default/
|
Missing 'case' statements for 'iota' consts in 'switch':
pkg/services/job/job.go#L816
Missing 'case' statements for 'iota' consts in 'switch'
|
Unused parameter:
pkg/transformer/encoders/gob/gob.go#L55
Unused parameter `key`
|
Unused parameter:
pkg/transformer/encoders/hex/hex.go#L58
Unused parameter `key`
|
Unused parameter:
pkg/authenticators/none/none.go#L56
Unused parameter `data`
|
Unused parameter:
pkg/transformer/encoders/base64/base64.go#L56
Unused parameter `key`
|
Direct comparison of errors:
pkg/servers/http/http.go#L367
Comparison with errors using equality operators fails on wrapped errors
|
Direct comparison of errors:
pkg/servers/http/http.go#L367
Comparison with errors using equality operators fails on wrapped errors
|