Use step-ci as gh author instead of step-travis-ci #1784
ci.yml
on: pull_request
ci
/
...
/
set-go-matrix
3s
ci
/
...
/
set-go-matrix
2s
ci
/
actionlint
6s
ci
/
...
/
lint
55s
ci
/
...
/
govulncheck
34s
Matrix: ci / codeql / CodeQL Analyze
Matrix: ci / build / build
Matrix: ci / test / test
Annotations
20 errors
|
ci / govulncheck / govulncheck
actions.prettyPrint calls protojson.Marshal, which eventually calls cert.RawNebulaCertificate.ProtoReflect
|
|
ci / govulncheck / govulncheck
oauth.oauth.DoDeviceAuthorization calls fmt.Fprintln, which eventually calls cert.RawNebulaArgon2Parameters.String
|
|
ci / govulncheck / govulncheck
actions.prettyPrint calls protojson.Marshal, which eventually calls cert.RawNebulaArgon2Parameters.ProtoReflect
|
|
ci / govulncheck / govulncheck
provisioner.caConfigClient.UpdateProvisioner calls authority.Authority.UpdateProvisioner, which eventually calls cert.NewCAPoolFromBytes
|
|
ci / govulncheck / govulncheck
token.WithNebulaCert calls cert.NebulaCertificate.VerifyPrivateKey
|
|
ci / govulncheck / govulncheck
cautils.OfflineCA.SSHRekey calls authority.Authority.Authorize, which eventually calls cert.NebulaCertificate.Verify
|
|
ci / govulncheck / govulncheck
oauth.oauth.DoDeviceAuthorization calls fmt.Fprintln, which eventually calls cert.NebulaCertificate.String
|
|
ci / govulncheck / govulncheck
provisioner.readNebulaRoots calls cert.NebulaCertificate.MarshalToPEM
|
|
ci / govulncheck / govulncheck
oauth.oauth.DoDeviceAuthorization calls fmt.Fprintln, which eventually calls cert.Curve.String
|
|
ci / govulncheck / govulncheck
provisioner.caConfigClient.UpdateProvisioner calls authority.Authority.UpdateProvisioner, which eventually calls cert.Curve.Descriptor
|
|
ci / lint / lint:
command/oauth/cmd.go#L580
G101: Potential hardcoded credentials (gosec)
|
|
ci / lint / lint:
command/oauth/cmd.go#L574
G101: Potential hardcoded credentials (gosec)
|
|
ci / lint / lint:
command/oauth/cmd.go#L71
G117: Exported struct field "RefreshToken" (JSON key "refresh_token") matches secret pattern (gosec)
|
|
ci / lint / lint:
command/oauth/cmd.go#L69
G117: Exported struct field "AccessToken" (JSON key "access_token") matches secret pattern (gosec)
|
|
ci / lint / lint:
command/crypto/winpe/winpe.go#L70
G703: Path traversal via taint analysis (gosec)
|
|
ci / lint / lint:
command/crypto/jwk/keyset.go#L237
G115: integer overflow conversion uintptr -> int (gosec)
|
|
ci / lint / lint:
command/certificate/verify.go#L392
G704: SSRF via taint analysis (gosec)
|
|
ci / lint / lint:
command/ca/provisioner/add.go#L31
G101: Potential hardcoded credentials: Google Cloud Platform OAuth (gosec)
|
|
ci / lint / lint:
command/ca/acme/eab/list.go#L103
G702: Command injection via taint analysis (gosec)
|
|
ci / lint / lint:
command/api/token/create.go#L123
G704: SSRF via taint analysis (gosec)
|