feat(#249): MySQL syntax support (Phase 2) #577
Triggered via pull request
February 17, 2026 14:22
Status
Success
Total duration
10m 27s
Artifacts
–
security.yml
on: pull_request
GoSec Security Scanner
1m 7s
Trivy Repository Scan
20s
Trivy Config Scan
26s
Go Vulnerability Check
23s
Dependency Review
7s
Security Scan Summary
2s
Annotations
10 errors
|
Go Vulnerability Check
config.Load calls os.ReadFile
|
|
Go Vulnerability Check
cmdutil.ExpandDirectory calls os.ReadDir
|
|
Go Vulnerability Check
lspcmd.runLSP calls os.OpenFile
|
|
Go Vulnerability Check
validate.SecurityValidator.Validate calls os.Open
|
|
Go Vulnerability Check
schema.init calls os.init, which calls os.NewFile
|
|
Go Vulnerability Check
validate.SecurityValidator.Validate calls os.Lstat
|
|
Go Vulnerability Check
validate.SecurityValidator.checkPathTraversal calls filepath.Abs, which eventually calls os.Getwd
|
|
Go Vulnerability Check
linter.Linter.LintDirectory calls filepath.Walk, which eventually calls os.File.Readdirnames
|
|
Go Vulnerability Check
cmd.FileWatcher.addSinglePath calls fsnotify.Watcher.Add, which eventually calls os.File.ReadDir
|
|
Go Vulnerability Check
cmd.validateFromStdin calls os.CreateTemp
|