Skip to content

feat(#249): T-SQL / SQL Server syntax support (Phase 3) #584

feat(#249): T-SQL / SQL Server syntax support (Phase 3)

feat(#249): T-SQL / SQL Server syntax support (Phase 3) #584

Triggered via pull request February 24, 2026 15:44
Status Success
Total duration 1m 18s
Artifacts

security.yml

on: pull_request
GoSec Security Scanner
1m 7s
GoSec Security Scanner
Trivy Repository Scan
53s
Trivy Repository Scan
Trivy Config Scan
53s
Trivy Config Scan
Go Vulnerability Check
25s
Go Vulnerability Check
Dependency Review
55s
Dependency Review
Security Scan Summary
2s
Security Scan Summary
Fit to window
Zoom out
Zoom in

Annotations

10 errors and 2 warnings
Go Vulnerability Check
config.Load calls os.ReadFile
Go Vulnerability Check
cmdutil.ExpandDirectory calls os.ReadDir
Go Vulnerability Check
lspcmd.runLSP calls os.OpenFile
Go Vulnerability Check
validate.SecurityValidator.Validate calls os.Open
Go Vulnerability Check
schema.init calls os.init, which calls os.NewFile
Go Vulnerability Check
validate.SecurityValidator.Validate calls os.Lstat
Go Vulnerability Check
validate.SecurityValidator.checkPathTraversal calls filepath.Abs, which eventually calls os.Getwd
Go Vulnerability Check
linter.Linter.LintDirectory calls filepath.Walk, which eventually calls os.File.Readdirnames
Go Vulnerability Check
cmd.FileWatcher.addSinglePath calls fsnotify.Watcher.Add, which eventually calls os.File.ReadDir
Go Vulnerability Check
cmd.validateFromStdin calls os.CreateTemp
Dependency Review
Back off 29.469 seconds before retry.
Dependency Review
Failed to download action 'https://api.github.com/repos/actions/dependency-review-action/tarball/05fe4576374b728f0c523d6a13d64c25081e0803'. Error: Response status code does not indicate success: 502 (Bad Gateway). 9800:3E5343:33E78B:DB86EB:699DC77C