Go vulnerability checking #536
Annotations
10 errors and 1 warning
check for go vulnerabilities
apiary.ParishesHandler calls pgxpool.Pool.Query, which eventually calls pgproto3.Bind.Encode
|
check for go vulnerabilities
apiary.ParishesHandler calls pgxpool.Pool.Query, which eventually calls pgproto3.Describe.Encode
|
check for go vulnerabilities
apiary.ParishesHandler calls pgxpool.Pool.Query, which eventually calls pgproto3.Execute.Encode
|
check for go vulnerabilities
db.Connect calls pgxpool.ConnectConfig, which eventually calls pgproto3.GSSResponse.Encode
|
check for go vulnerabilities
apiary.ParishesHandler calls pgxpool.Pool.Query, which eventually calls pgproto3.Parse.Encode
|
check for go vulnerabilities
db.Connect calls pgxpool.ConnectConfig, which eventually calls pgproto3.PasswordMessage.Encode
|
check for go vulnerabilities
apiary.ParishesHandler calls pgxpool.Pool.Query, which eventually calls pgproto3.Query.Encode
|
check for go vulnerabilities
db.Connect calls pgxpool.ConnectConfig, which eventually calls pgproto3.SASLInitialResponse.Encode
|
check for go vulnerabilities
db.Connect calls pgxpool.ConnectConfig, which eventually calls pgproto3.SASLResponse.Encode
|
check for go vulnerabilities
db.Connect calls pgxpool.ConnectConfig, which eventually calls pgproto3.StartupMessage.Encode
|
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: actions/checkout@v3, actions/setup-go@v3. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
|
The logs for this run have expired and are no longer available.
Loading