Skip to content

Lock agents repo map on Get #24

Lock agents repo map on Get

Lock agents repo map on Get #24

Triggered via push October 15, 2024 12:53
Status Failure
Total duration 1m 58s
Artifacts

go_dev.yml

on: push
Code Quality Scan & Build: Development Work
1m 37s
Code Quality Scan & Build: Development Work
Fit to window
Zoom out
Zoom in

Annotations

3 errors, 6 warnings, and 2 notices
Code Quality Scan & Build: Development Work
gob.Coder.Decode calls gob.Decoder.Decode
Code Quality Scan & Build: Development Work
Process completed with exit code 3.
Vulnerable declared dependency: go.mod#L27
Dependency go:golang.org/x/crypto:v0.22.0 is vulnerable, safe version 0.23.0 * [CVE-2023-42818](https://devhub.checkmarx.com/cve-details/CVE-2023-42818?utm_source=jetbrains&utm_medium=referral) 9.8 Improper Restriction of Excessive Authentication Attempts vulnerability with High severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Code Quality Scan & Build: Development Work
The following actions use a deprecated Node.js version and will be forced to run on node20: actions/setup-go@v4. For more info: https://github.blog/changelog/2024-03-07-github-actions-all-actions-will-run-on-node20-instead-of-node16-by-default/
Missing 'case' statements for 'iota' consts in 'switch': pkg/services/job/job.go#L816
Missing 'case' statements for 'iota' consts in 'switch'
Unused parameter: pkg/transformer/encoders/gob/gob.go#L55
Unused parameter `key`
Unused parameter: pkg/transformer/encoders/hex/hex.go#L58
Unused parameter `key`
Unused parameter: pkg/authenticators/none/none.go#L56
Unused parameter `data`
Direct comparison of errors: pkg/servers/http/http.go#L367
Comparison with errors using equality operators fails on wrapped errors
Direct comparison of errors: pkg/servers/http/http.go#L367
Comparison with errors using equality operators fails on wrapped errors