Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump github.com/sigstore/cosign/v2 from 2.2.3 to 2.2.4 #220

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

build(deps): bump github.com/sigstore/cosign/v2 from 2.2.3 to 2.2.4

52908a4
Select commit
Loading
Failed to load commit list.
Open

build(deps): bump github.com/sigstore/cosign/v2 from 2.2.3 to 2.2.4 #220

build(deps): bump github.com/sigstore/cosign/v2 from 2.2.3 to 2.2.4
52908a4
Select commit
Loading
Failed to load commit list.
DryRunSecurity / Sensitive Files Analyzer succeeded May 29, 2024 in 1s

DryRun Security

Details

Sensitive Files Analyzer Findings: 3 detected

⚠️ Potential Sensitive File go.mod (click for details)
Type Potential Sensitive File
Description Golang applications manage their dependencies through their go.mod and go.sum files. A change in these files may indicate an addition of a library/dependency which could introduce additional risk to the application either through vulnerable code, expansion of the application's attack surface via additional routes, or malicious code.
Filename go.mod
CodeLink

compage/go.mod

Lines 10 to 16 in 52908a4

github.com/google/go-containerregistry v0.19.1
github.com/iancoleman/strcase v0.3.0
github.com/opencontainers/image-spec v1.1.0
github.com/sigstore/cosign/v2 v2.2.4
github.com/sigstore/sigstore v1.8.3
github.com/sirupsen/logrus v1.9.3
github.com/spf13/cobra v1.8.0
⚠️ Potential Sensitive File go.sum (click for details)
Type Potential Sensitive File
Description Golang applications manage their dependencies through their go.mod and go.sum files. A change in these files may indicate an addition of a library/dependency which could introduce additional risk to the application either through vulnerable code, expansion of the application's attack surface via additional routes, or malicious code.
Filename go.sum
CodeLink

compage/go.sum

Lines 10 to 17 in 52908a4

cloud.google.com/go/kms v1.15.8/go.mod h1:WoUHcDjD9pluCg7pNds131awnH429QGvRM3N/4MyoVs=
cuelabs.dev/go/oci/ociregistry v0.0.0-20240328172057-7eb5fc60a0e0 h1:zH0OUCrYjN/fNsKacQfUbzW/2C4wBBRh/VNFlVJSmQ4=
cuelabs.dev/go/oci/ociregistry v0.0.0-20240328172057-7eb5fc60a0e0/go.mod h1:pK23AUVXuNzzTpfMCA06sxZGeVQ/75FdVtW249de9Uo=
cuelang.org/go v0.8.1 h1:VFYsxIFSPY5KgSaH1jQ2GxHOrbu6Ga3kEI70yCZwnOg=
cuelang.org/go v0.8.1/go.mod h1:CoDbYolfMms4BhWUlhD+t5ORnihR7wvjcfgyO9lL5FI=
dario.cat/mergo v1.0.0 h1:AGCNq9Evsj31mOgNPcLyXc+4PNABt905YmuqPYYpBWk=
dario.cat/mergo v1.0.0/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk=
filippo.io/edwards25519 v1.1.0 h1:FNf4tywRC1HmFuKW5xopWpigGjJKiJSV0Cqo0cJWDaA=
⚠️ Potential Sensitive File vendor/github.com/hashicorp/hcl/Makefile (click for details)
Type Potential Sensitive File
Description Makefiles tend to influence the behavior of the executing program and can have security consequences if applied incorrectly. For example, having the ability to run commands that could be irreversible such as rm -rf /, changing file permissions, tampering with dependencies, and more.
Filename vendor/github.com/hashicorp/hcl/Makefile
CodeLink
TEST?=./...
default: test
fmt: generate
go fmt ./...
test: generate
go get -t ./...
go test $(TEST) $(TESTARGS)
generate:
go generate ./...
updatedeps:
go get -u golang.org/x/tools/cmd/stringer
.PHONY: default generate test updatedeps