Skip to content

feat(#249): MySQL syntax support (Phase 2) (#316) #578

feat(#249): MySQL syntax support (Phase 2) (#316)

feat(#249): MySQL syntax support (Phase 2) (#316) #578

Triggered via push February 20, 2026 15:10
Status Failure
Total duration 1m 14s
Artifacts

security.yml

on: push
GoSec Security Scanner
1m 5s
GoSec Security Scanner
Trivy Repository Scan
25s
Trivy Repository Scan
Trivy Config Scan
18s
Trivy Config Scan
Go Vulnerability Check
19s
Go Vulnerability Check
Dependency Review
0s
Dependency Review
Security Scan Summary
2s
Security Scan Summary
Fit to window
Zoom out
Zoom in

Annotations

12 errors
Go Vulnerability Check
config.Load calls os.ReadFile
Go Vulnerability Check
cmdutil.ExpandDirectory calls os.ReadDir
Go Vulnerability Check
lspcmd.runLSP calls os.OpenFile
Go Vulnerability Check
validate.SecurityValidator.Validate calls os.Open
Go Vulnerability Check
schema.init calls os.init, which calls os.NewFile
Go Vulnerability Check
validate.SecurityValidator.Validate calls os.Lstat
Go Vulnerability Check
validate.SecurityValidator.checkPathTraversal calls filepath.Abs, which eventually calls os.Getwd
Go Vulnerability Check
linter.Linter.LintDirectory calls filepath.Walk, which eventually calls os.File.Readdirnames
Go Vulnerability Check
cmd.FileWatcher.addSinglePath calls fsnotify.Watcher.Add, which eventually calls os.File.ReadDir
Go Vulnerability Check
cmd.validateFromStdin calls os.CreateTemp
Trivy Repository Scan
Process completed with exit code 1.
Security Scan Summary
Process completed with exit code 1.