@@ -1511,10 +1511,17 @@ linters:
15111511 - G110 # Detect io.Copy instead of io.CopyN when decompression
15121512 - G111 # Detect http.Dir('/') as a potential risk
15131513 - G112 # Detect ReadHeaderTimeout not configured as a potential risk
1514+ - G113 # HTTP request smuggling via conflicting headers or bare LF in body parsing
15141515 - G114 # Use of net/http serve function that has no support for setting timeouts
15151516 - G115 # Type conversion which leads to integer overflow
15161517 - G116 # Detect Trojan Source attacks using bidirectional Unicode characters
1517- - G117 # Potential exposure of secrets via JSON marshaling
1518+ - G117 # Potential exposure of secrets via JSON/YAML/XML/TOML marshaling
1519+ - G118 # Context propagation failure leading to goroutine/resource leaks
1520+ - G119 # Unsafe redirect policy may propagate sensitive headers
1521+ - G120 # Unbounded form parsing in HTTP handlers can cause memory exhaustion
1522+ - G121 # Unsafe CrossOriginProtection bypass patterns
1523+ - G122 # Filesystem TOCTOU race risk in filepath.Walk/WalkDir callbacks
1524+ - G123 # TLS resumption may bypass VerifyPeerCertificate when VerifyConnection is unset
15181525 - G201 # SQL query construction using format string
15191526 - G202 # SQL query construction using string concatenation
15201527 - G203 # Use of unescaped data in HTML templates
@@ -1532,6 +1539,7 @@ linters:
15321539 - G404 # Insecure random number source (rand)
15331540 - G405 # Detect the usage of DES or RC4
15341541 - G406 # Detect the usage of deprecated MD4 or RIPEMD160
1542+ - G408 # Stateful misuse of ssh.PublicKeyCallback leading to auth bypass
15351543 - G501 # Import blocklist: crypto/md5
15361544 - G502 # Import blocklist: crypto/des
15371545 - G503 # Import blocklist: crypto/rc4
@@ -1547,6 +1555,7 @@ linters:
15471555 - G704 # SSRF via taint analysis
15481556 - G705 # XSS via taint analysis
15491557 - G706 # Log injection via taint analysis
1558+ - G707 # SMTP command/header injection via taint analysis
15501559
15511560 # To specify a set of rules to explicitly exclude.
15521561 # Available rules: https://github.com/securego/gosec#available-rules
@@ -2813,6 +2822,22 @@ linters:
28132822 exclude : [""]
28142823 arguments :
28152824 - ignore-directories : ["testcases", "testinfo"]
2825+ # https://github.com/mgechev/revive/blob/HEAD/RULES_DESCRIPTIONS.md#package-naming
2826+ - name : package-naming
2827+ severity : warning
2828+ disabled : false
2829+ exclude : [""]
2830+ arguments :
2831+ - skip-convention-name-check : true
2832+ convention-name-check-regex : " ^[a-z][a-zA-Z0-9]*$"
2833+ skip-top-level-check : true
2834+ skip-default-bad-name-check : true
2835+ check-extra-bad-name : true
2836+ user-defined-bad-names :
2837+ - foo
2838+ - bar
2839+ skip-collision-with-common-std : true
2840+ check-collision-with-all-std : true
28162841 # https://github.com/mgechev/revive/blob/HEAD/RULES_DESCRIPTIONS.md#range
28172842 - name : range
28182843 severity : warning
@@ -2995,6 +3020,11 @@ linters:
29953020 severity : warning
29963021 disabled : false
29973022 exclude : [""]
3023+ # https://github.com/mgechev/revive/blob/HEAD/RULES_DESCRIPTIONS.md#use-slices-sort
3024+ - name : use-slices-sort
3025+ severity : warning
3026+ disabled : false
3027+ exclude : [""]
29983028 # https://github.com/mgechev/revive/blob/HEAD/RULES_DESCRIPTIONS.md#use-waitgroup-go
29993029 - name : use-waitgroup-go
30003030 severity : warning
@@ -3025,11 +3055,6 @@ linters:
30253055 - [ "VM" ] # DenyList
30263056 - - skip-initialism-name-checks : true
30273057 upper-case-const : true
3028- skip-package-name-checks : true
3029- skip-package-name-collision-with-go-std : true
3030- extra-bad-package-names :
3031- - helpers
3032- - models
30333058 # https://github.com/mgechev/revive/blob/HEAD/RULES_DESCRIPTIONS.md#waitgroup-by-value
30343059 - name : waitgroup-by-value
30353060 severity : warning
0 commit comments