Fixed SOCKS issues #16
go_dev.yml
on: push
Code Quality Scan & Build: Development Work
1m 38s
Annotations
3 errors, 7 warnings, and 3 notices
Code Quality Scan & Build: Development Work
jwe.Encrypter.Deconstruct calls jose.JSONWebEncryption.Decrypt
|
Code Quality Scan & Build: Development Work
Process completed with exit code 3.
|
Vulnerable declared dependency:
go.mod#L29
Dependency go:golang.org/x/crypto:v0.17.0 is vulnerable, safe version v0.21.0
* [CVE-2023-42818](https://devhub.checkmarx.com/cve-details/CVE-2023-42818?utm_source=jetbrains&utm_medium=referral) 9.8 Improper Restriction of Excessive Authentication Attempts vulnerability with High severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Code Quality Scan & Build: Development Work
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: actions/checkout@v3, actions/setup-go@v4. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
|
Missing 'case' statements for 'iota' consts in 'switch':
pkg/services/job/job.go#L816
Missing 'case' statements for 'iota' consts in 'switch'
|
Unused parameter:
pkg/transformer/encoders/gob/gob.go#L55
Unused parameter `key`
|
Unused parameter:
pkg/transformer/encoders/hex/hex.go#L58
Unused parameter `key`
|
Unused parameter:
pkg/authenticators/none/none.go#L56
Unused parameter `data`
|
Unused parameter:
pkg/transformer/encoders/base64/base64.go#L56
Unused parameter `key`
|
Vulnerable declared dependency:
go.mod#L16
Dependency go:google.golang.org/protobuf:v1.32.0 is vulnerable, safe version v1.33.0
* [CVE-2024-24786](https://devhub.checkmarx.com/cve-details/CVE-2024-24786?utm_source=jetbrains&utm_medium=referral) 7.5 Loop with Unreachable Exit Condition ("Infinite Loop") vulnerability with High severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Direct comparison of errors:
pkg/servers/http/http.go#L367
Comparison with errors using equality operators fails on wrapped errors
|
Direct comparison of errors:
pkg/servers/http/http.go#L367
Comparison with errors using equality operators fails on wrapped errors
|
Vulnerable declared dependency:
go.mod#L9
Dependency go:github.com/go-jose/go-jose/v3:v3.0.1 is vulnerable, safe version v3.0.3
* [CVE-2024-28180](https://devhub.checkmarx.com/cve-details/CVE-2024-28180?utm_source=jetbrains&utm_medium=referral) 4.3 Improper Handling of Highly Compressed Data (Data Amplification) vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|