Skip to content

main

main #605

Triggered via pull request review October 23, 2024 12:20
@trauttraut
submitted 4613673
Status Failure
Total duration 21m 58s
Artifacts

main.yml

on: pull_request_review
common_checks  /  golangci-lint
2m 15s
common_checks / golangci-lint
common_checks  /  codegen-check
2m 7s
common_checks / codegen-check
common_checks  /  lint-protobuf
8s
common_checks / lint-protobuf
partial_checks  /  builds
partial_checks / builds
partial_checks  /  tests
partial_checks / tests
Matrix: full_checks / builds
Matrix: full_checks / tests
Fit to window
Zoom out
Zoom in

Annotations

10 errors
common_checks / golangci-lint: print/htmlprint/printer.go#L118
G203: The used method does not auto-escape HTML. This can potentially lead to 'Cross-site Scripting' vulnerabilities, in case the attacker controls the input. (gosec)
common_checks / golangci-lint: plugin/pluginapi/v1/client.go#L47
G104: Errors unhandled. (gosec)
common_checks / golangci-lint: plugin/pluginapi/v1/client.go#L52
G104: Errors unhandled. (gosec)
common_checks / golangci-lint: cmd/root.go#L195
G104: Errors unhandled. (gosec)
common_checks / golangci-lint: cmd/internal/telemetry/telemetry.go#L92
G301: Expect directory permissions to be 0750 or less (gosec)
common_checks / golangci-lint: cmd/internal/telemetry/telemetry.go#L105
G301: Expect directory permissions to be 0750 or less (gosec)
common_checks / golangci-lint: cmd/internal/telemetry/telemetry.go#L140
G304: Potential file inclusion via variable (gosec)
common_checks / golangci-lint: cmd/internal/telemetry/telemetry.go#L163
G304: Potential file inclusion via variable (gosec)
common_checks / golangci-lint: cmd/internal/telemetry/telemetry.go#L185
G304: Potential file inclusion via variable (gosec)
common_checks / golangci-lint: pkg/sloghclog/sloghclog.go#L79
G115: integer overflow conversion int -> int32 (gosec)