-
-
Notifications
You must be signed in to change notification settings - Fork 690
Comparing changes
Open a pull request
base repository: securego/gosec
base: v2.24.0
head repository: securego/gosec
compare: v2.24.1
- 10 commits
- 18 files changed
- 2 contributors
Commits on Feb 27, 2026
-
Update to gosec to v2.24.0 in the action and fix the docker image sig…
…ning (#1552) Update the GitHub action to use gosec v2.24.0 and fix the docker image signing Signed-off-by: Cosmin Cojocar <cosmin@cojocar.ch>
Configuration menu - View commit details
-
Copy full SHA for fd69748 - Browse repository at this point
Copy the full SHA fd69748View commit details -
Extend the release workflow to push the container images also to GHCR
The relese process is extended to push also images to GHCR in addition to DockerHub. This is in preparation to migrate to GHCR after the next release. Signed-off-by: Cosmin Cojocar <cosmin@cojocar.ch>
Configuration menu - View commit details
-
Copy full SHA for 14d95fe - Browse repository at this point
Copy the full SHA 14d95feView commit details -
Configuration menu - View commit details
-
Copy full SHA for c8a396c - Browse repository at this point
Copy the full SHA c8a396cView commit details
Commits on Feb 28, 2026
-
fix(G705): eliminate false positive when guard type cannot be resolved (
#1554) * fix(G705): eliminate false positive when guard type cannot be resolved A guard cannot be satisfied when its type cannot be resolved. Otherwise gosec fires for code like: ```go package main import ( "fmt" "os" ) func main() { fmt.Fprint(os.Stdout, os.Args[1]) } ``` In this case the guard type `http.ResponseWriter` cannot be resolved, all guards (1) are satisfied and we have a false gosec warning. Signed-off-by: leonnicolas <leonloechner@gmx.de> * remove the http package from example --------- Signed-off-by: leonnicolas <leonloechner@gmx.de>
Configuration menu - View commit details
-
Copy full SHA for e7eb24d - Browse repository at this point
Copy the full SHA e7eb24dView commit details -
fix(G120): prevent hang-like analysis blowup in wrapper protection ch…
…ecks (#1556) Summary: This change fixes the hang/perceived hang reported in issue #1555 when scanning large codebases with complex SSA graphs. The fix is intentionally scoped to G120 form parsing analysis only. Root cause: G120 wrapper/middleware protection logic repeatedly called value-dependency checks across many function/call combinations. The dependency traversal was depth-limited but not memoized, so cyclic and branch-heavy SSA structures (especially Phi-related paths) caused repeated re-traversal of the same graph regions and severe runtime blowup. What changed: A cycle-safe, memoized dependency checker was added and used only inside the G120 form parsing analysis flow. Existing G120 logic was kept semantically equivalent while replacing repeated raw dependency traversals with cached checks. Focused regression tests were added for cyclic Phi graphs to verify both cases: no target reachable (false) and target reachable (true), including stable repeated evaluation. Signed-off-by: Cosmin Cojocar <cosmin@cojocar.ch>
Configuration menu - View commit details
-
Copy full SHA for 9e5b3e2 - Browse repository at this point
Copy the full SHA 9e5b3e2View commit details -
Add a SKILL and PROMPT for generating rules with AI (#1557)
Signed-off-by: Cosmin Cojocar <cosmin@cojocar.ch>
Configuration menu - View commit details
-
Copy full SHA for 50c4345 - Browse repository at this point
Copy the full SHA 50c4345View commit details -
Add a SKILL and PROMPT for fixing a GitHub issue (#1558)
Signed-off-by: Cosmin Cojocar <cosmin@cojocar.ch>
Configuration menu - View commit details
-
Copy full SHA for 34fe694 - Browse repository at this point
Copy the full SHA 34fe694View commit details -
fix(analyzers): avoid SSA dependency cycle blowups in issue #1555 pat…
…hs (#1559) Route redirect dependency checks through the cycle-safe dependencyChecker instead of raw recursive valueDependsOn traversal. This ensures Phi-cycle graphs terminate quickly and avoids recursive work amplification that can look like hangs on large/generated codebases. Also remove the nil fallback in dependencyChecker.dependsOn so all analyzer paths consistently use cycle-aware logic. Add regression tests covering raw valueDependsOn behavior on: Phi cycle without target (must return false) Phi cycle with target path (must return true) Self-referential Phi node (must return false) Signed-off-by: Cosmin Cojocar <cosmin@cojocar.ch>
Configuration menu - View commit details
-
Copy full SHA for 7210bac - Browse repository at this point
Copy the full SHA 7210bacView commit details -
Configuration menu - View commit details
-
Copy full SHA for 84df6fa - Browse repository at this point
Copy the full SHA 84df6faView commit details -
chore(prompts): add skill and prompt to update supported Go versions (#…
…1561) * chore(prompts): add supported Go version update skill and prompt * docs: add usage for supported Go version update prompt
Configuration menu - View commit details
-
Copy full SHA for a7ab382 - Browse repository at this point
Copy the full SHA a7ab382View commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v2.24.0...v2.24.1