Skip to content

Use step-ci as gh author instead of step-travis-ci #1784

Use step-ci as gh author instead of step-travis-ci

Use step-ci as gh author instead of step-travis-ci #1784

Triggered via pull request February 20, 2026 18:24
Status Failure
Total duration 2m 37s
Artifacts

ci.yml

on: pull_request
ci  /  ...  /  set-go-matrix
3s
ci / build / set-go-matrix
ci  /  ...  /  set-go-matrix
2s
ci / test / set-go-matrix
ci  /  actionlint
6s
ci / actionlint
ci  /  ...  /  lint
55s
ci / lint / lint
ci  /  ...  /  govulncheck
34s
ci / govulncheck / govulncheck
Matrix: ci / codeql / CodeQL Analyze
Matrix: ci / build / build
Matrix: ci / test / test
Fit to window
Zoom out
Zoom in

Annotations

20 errors
ci / govulncheck / govulncheck
actions.prettyPrint calls protojson.Marshal, which eventually calls cert.RawNebulaCertificate.ProtoReflect
ci / govulncheck / govulncheck
oauth.oauth.DoDeviceAuthorization calls fmt.Fprintln, which eventually calls cert.RawNebulaArgon2Parameters.String
ci / govulncheck / govulncheck
actions.prettyPrint calls protojson.Marshal, which eventually calls cert.RawNebulaArgon2Parameters.ProtoReflect
ci / govulncheck / govulncheck
provisioner.caConfigClient.UpdateProvisioner calls authority.Authority.UpdateProvisioner, which eventually calls cert.NewCAPoolFromBytes
ci / govulncheck / govulncheck
token.WithNebulaCert calls cert.NebulaCertificate.VerifyPrivateKey
ci / govulncheck / govulncheck
cautils.OfflineCA.SSHRekey calls authority.Authority.Authorize, which eventually calls cert.NebulaCertificate.Verify
ci / govulncheck / govulncheck
oauth.oauth.DoDeviceAuthorization calls fmt.Fprintln, which eventually calls cert.NebulaCertificate.String
ci / govulncheck / govulncheck
provisioner.readNebulaRoots calls cert.NebulaCertificate.MarshalToPEM
ci / govulncheck / govulncheck
oauth.oauth.DoDeviceAuthorization calls fmt.Fprintln, which eventually calls cert.Curve.String
ci / govulncheck / govulncheck
provisioner.caConfigClient.UpdateProvisioner calls authority.Authority.UpdateProvisioner, which eventually calls cert.Curve.Descriptor
ci / lint / lint: command/oauth/cmd.go#L580
G101: Potential hardcoded credentials (gosec)
ci / lint / lint: command/oauth/cmd.go#L574
G101: Potential hardcoded credentials (gosec)
ci / lint / lint: command/oauth/cmd.go#L71
G117: Exported struct field "RefreshToken" (JSON key "refresh_token") matches secret pattern (gosec)
ci / lint / lint: command/oauth/cmd.go#L69
G117: Exported struct field "AccessToken" (JSON key "access_token") matches secret pattern (gosec)
ci / lint / lint: command/crypto/winpe/winpe.go#L70
G703: Path traversal via taint analysis (gosec)
ci / lint / lint: command/crypto/jwk/keyset.go#L237
G115: integer overflow conversion uintptr -> int (gosec)
ci / lint / lint: command/certificate/verify.go#L392
G704: SSRF via taint analysis (gosec)
ci / lint / lint: command/ca/provisioner/add.go#L31
G101: Potential hardcoded credentials: Google Cloud Platform OAuth (gosec)
ci / lint / lint: command/ca/acme/eab/list.go#L103
G702: Command injection via taint analysis (gosec)
ci / lint / lint: command/api/token/create.go#L123
G704: SSRF via taint analysis (gosec)