Skip to content

Avoid govulncheck warning about go-version (#100) #187

Avoid govulncheck warning about go-version (#100)

Avoid govulncheck warning about go-version (#100) #187

Triggered via push January 21, 2025 12:30
Status Failure
Total duration 39s
Artifacts

security.yml

on: push
Scan for vulnerabilities in Go code
30s
Scan for vulnerabilities in Go code
Fit to window
Zoom out
Zoom in

Annotations

10 errors and 1 warning
Scan for vulnerabilities in Go code
internal.App.doCommitsForProject calls git.Worktree.Commit, which eventually calls binary.Read
Scan for vulnerabilities in Go code
internal.App.lastCommitDate calls git.Repository.CommitObject, which eventually calls binary.ReadHash
Scan for vulnerabilities in Go code
internal.App.doCommitsForProject calls git.Worktree.Commit, which eventually calls binary.ReadUint16
Scan for vulnerabilities in Go code
internal.App.doCommitsForProject calls git.Worktree.Commit, which eventually calls binary.ReadUint32
Scan for vulnerabilities in Go code
internal.App.doCommitsForProject calls git.Worktree.Commit, which eventually calls binary.ReadUntil
Scan for vulnerabilities in Go code
internal.App.lastCommitDate calls git.Repository.CommitObject, which eventually calls binary.ReadVariableWidthInt
Scan for vulnerabilities in Go code
internal.App.doCommitsForProject calls git.Worktree.Commit, which eventually calls binary.Write
Scan for vulnerabilities in Go code
internal.init calls object.init, which calls binary.init
Scan for vulnerabilities in Go code
internal.App.createOrOpenRepo calls git.PlainInit, which eventually calls cache.NewObjectLRUDefault
Scan for vulnerabilities in Go code
internal.App.lastCommitDate calls git.Repository.CommitObject, which eventually calls cache.ObjectLRU.Get
Scan for vulnerabilities in Go code
Both go-version and go-version-file inputs are specified, only go-version will be used