G103
Use of unsafe calls should be audited.
Go is a very powerful language that makes you write performant code while having a lot of verification. Still, developers can make issues. Thankfully, the Codiga Static Code Analysis engine checks your Go code and flags the most important issues.
Use of unsafe calls should be audited.
Expect WriteFile permissions to be 0600 or less
Deferring unsafe method "Close" on type "*os.File"
Use of weak cryptographic primitive
Blocklisted import crypto/md5: weak cryptographic primitive
Subprocess launched with variable
Expect file permissions to be 0600 or less
Hardcoded credentials
Bind to all interfaces
Audit errors not checked
Url provided to HTTP request as taint input
SQL query construction using format string/string concatenation
SQL query construction using format string/string concatenation
Profiling endpoint is automatically exposed on /debug/pprof
Expect directory permissions to be 0750 or less
Blocklisted import crypto/des: weak cryptographic primitive
File traversal when extracting zip/tar archive
We use cookies to improve your site experience, including analytics cookies to understand how you use our product and design better experiences. Please read our Cookie Policy.