Scan code with govulncheck #1
security.yml
on: pull_request
Scan for vulnerabilities in Go code
19s
Annotations
10 errors
Scan for vulnerabilities in Go code
internal.GitLab.CurrentUser calls gitlab.UsersService.CurrentUser, which eventually calls tls.Conn.HandshakeContext
|
Scan for vulnerabilities in Go code
internal.GitLab.CurrentUser calls gitlab.UsersService.CurrentUser, which eventually calls tls.Conn.Read
|
Scan for vulnerabilities in Go code
internal.GitLab.CurrentUser calls gitlab.UsersService.CurrentUser, which eventually calls tls.Conn.Write
|
Scan for vulnerabilities in Go code
internal.GitLab.CurrentUser calls gitlab.UsersService.CurrentUser, which eventually calls tls.Dialer.DialContext
|
Scan for vulnerabilities in Go code
internal.App.createOrOpenRepo calls git.PlainOpen, which eventually calls filepath.Abs
|
Scan for vulnerabilities in Go code
internal.App.doCommitsForProject calls git.Worktree.Commit, which eventually calls filepath.Base
|
Scan for vulnerabilities in Go code
internal.App.createOrOpenRepo calls git.PlainInit, which eventually calls filepath.Clean
|
Scan for vulnerabilities in Go code
internal.App.createOrOpenRepo calls git.PlainOpen, which eventually calls filepath.Dir
|
Scan for vulnerabilities in Go code
internal.App.createOrOpenRepo calls git.PlainOpen, which eventually calls filepath.Join
|
Scan for vulnerabilities in Go code
internal.App.createOrOpenRepo calls git.PlainInit, which eventually calls filepath.Rel
|