build(deps): bump github.com/hashicorp/go-retryablehttp from 0.7.5 to 0.7.7 #221
DryRunSecurity / Sensitive Files Analyzer
succeeded
Jun 24, 2024 in 0s
DryRun Security
Details
Sensitive Files Analyzer Findings: 4 detected
⚠️ Potential Sensitive File go.mod (click for details)
Type | Potential Sensitive File |
Description | Golang applications manage their dependencies through their go.mod and go.sum files. A change in these files may indicate an addition of a library/dependency which could introduce additional risk to the application either through vulnerable code, expansion of the application's attack surface via additional routes, or malicious code. |
Filename | go.mod |
CodeLink | Lines 145 to 151 in 96f1436 |
⚠️ Potential Sensitive File go.sum (click for details)
Type | Potential Sensitive File |
Description | Golang applications manage their dependencies through their go.mod and go.sum files. A change in these files may indicate an addition of a library/dependency which could introduce additional risk to the application either through vulnerable code, expansion of the application's attack surface via additional routes, or malicious code. |
Filename | go.sum |
CodeLink | Lines 412 to 423 in 96f1436 |
⚠️ Potential Sensitive File vendor/github.com/hashicorp/go-retryablehttp/Makefile (click for details)
Type | Potential Sensitive File |
Description | Makefiles tend to influence the behavior of the executing program and can have security consequences if applied incorrectly. For example, having the ability to run commands that could be irreversible such as rm -rf / , changing file permissions, tampering with dependencies, and more. |
Filename | vendor/github.com/hashicorp/go-retryablehttp/Makefile |
CodeLink | compage/vendor/github.com/hashicorp/go-retryablehttp/Makefile Lines 2 to 8 in 96f1436 |
⚠️ Potential Sensitive File vendor/github.com/hashicorp/hcl/Makefile (click for details)
Type | Potential Sensitive File |
Description | Makefiles tend to influence the behavior of the executing program and can have security consequences if applied incorrectly. For example, having the ability to run commands that could be irreversible such as rm -rf / , changing file permissions, tampering with dependencies, and more. |
Filename | vendor/github.com/hashicorp/hcl/Makefile |
CodeLink | compage/vendor/github.com/hashicorp/hcl/Makefile Lines 1 to 18 in 96f1436 |
Loading