Upgrade github.com/slackhq/nebula and fix breaking changes
#1782
ci.yml
on: pull_request
ci
/
...
/
set-go-matrix
4s
ci
/
...
/
set-go-matrix
4s
ci
/
actionlint
7s
ci
/
...
/
lint
1m 35s
ci
/
...
/
govulncheck
52s
Matrix: ci / codeql / CodeQL Analyze
Matrix: ci / build / build
Matrix: ci / test / test
Annotations
10 errors
|
ci / lint / lint:
command/oauth/cmd.go#L580
G101: Potential hardcoded credentials (gosec)
|
|
ci / lint / lint:
command/oauth/cmd.go#L574
G101: Potential hardcoded credentials (gosec)
|
|
ci / lint / lint:
command/oauth/cmd.go#L71
G117: Exported struct field "RefreshToken" (JSON key "refresh_token") matches secret pattern (gosec)
|
|
ci / lint / lint:
command/oauth/cmd.go#L69
G117: Exported struct field "AccessToken" (JSON key "access_token") matches secret pattern (gosec)
|
|
ci / lint / lint:
command/crypto/winpe/winpe.go#L70
G703: Path traversal via taint analysis (gosec)
|
|
ci / lint / lint:
command/crypto/jwk/keyset.go#L237
G115: integer overflow conversion uintptr -> int (gosec)
|
|
ci / lint / lint:
command/certificate/verify.go#L392
G704: SSRF via taint analysis (gosec)
|
|
ci / lint / lint:
command/ca/provisioner/add.go#L31
G101: Potential hardcoded credentials: Google Cloud Platform OAuth (gosec)
|
|
ci / lint / lint:
command/ca/acme/eab/list.go#L103
G702: Command injection via taint analysis (gosec)
|
|
ci / lint / lint:
command/api/token/create.go#L123
G704: SSRF via taint analysis (gosec)
|