Skip to content

Upgrade github.com/slackhq/nebula and fix breaking changes #1782

Upgrade github.com/slackhq/nebula and fix breaking changes

Upgrade github.com/slackhq/nebula and fix breaking changes #1782

Triggered via pull request February 17, 2026 14:20
Status Failure
Total duration 3m 6s
Artifacts

ci.yml

on: pull_request
ci  /  ...  /  set-go-matrix
4s
ci / build / set-go-matrix
ci  /  ...  /  set-go-matrix
4s
ci / test / set-go-matrix
ci  /  actionlint
7s
ci / actionlint
ci  /  ...  /  lint
1m 35s
ci / lint / lint
ci  /  ...  /  govulncheck
52s
ci / govulncheck / govulncheck
Matrix: ci / codeql / CodeQL Analyze
Matrix: ci / build / build
Matrix: ci / test / test
Fit to window
Zoom out
Zoom in

Annotations

10 errors
ci / lint / lint: command/oauth/cmd.go#L580
G101: Potential hardcoded credentials (gosec)
ci / lint / lint: command/oauth/cmd.go#L574
G101: Potential hardcoded credentials (gosec)
ci / lint / lint: command/oauth/cmd.go#L71
G117: Exported struct field "RefreshToken" (JSON key "refresh_token") matches secret pattern (gosec)
ci / lint / lint: command/oauth/cmd.go#L69
G117: Exported struct field "AccessToken" (JSON key "access_token") matches secret pattern (gosec)
ci / lint / lint: command/crypto/winpe/winpe.go#L70
G703: Path traversal via taint analysis (gosec)
ci / lint / lint: command/crypto/jwk/keyset.go#L237
G115: integer overflow conversion uintptr -> int (gosec)
ci / lint / lint: command/certificate/verify.go#L392
G704: SSRF via taint analysis (gosec)
ci / lint / lint: command/ca/provisioner/add.go#L31
G101: Potential hardcoded credentials: Google Cloud Platform OAuth (gosec)
ci / lint / lint: command/ca/acme/eab/list.go#L103
G702: Command injection via taint analysis (gosec)
ci / lint / lint: command/api/token/create.go#L123
G704: SSRF via taint analysis (gosec)