Skip to content

remove token example which was not working anyway

7db65fd
Select commit
Loading
Failed to load commit list.
Closed

feature: Add support for Trivy in codacy-cli-v2 #29

remove token example which was not working anyway
7db65fd
Select commit
Loading
Failed to load commit list.
This check has been archived and is scheduled for deletion. Learn more about checks retention
Codacy Production / Codacy Static Code Analysis succeeded Mar 26, 2025 in 0s

Your pull request is up to standards!

Codacy found no issues in your code

Annotations

Check warning on line 3 in .examples/go.mod

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

.examples/go.mod#L3

Insecure dependency golang/stdlib@v1.22.3 (CVE-2024-24789: golang: archive/zip: Incorrect handling of certain ZIP files) (update to 1.21.11)

Check failure on line 3 in .examples/go.mod

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

.examples/go.mod#L3

Insecure dependency golang/stdlib@v1.22.3 (CVE-2024-24790: golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses) (update to 1.21.11)

Check warning on line 6 in .examples/go.mod

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

.examples/go.mod#L6

Insecure dependency golang/github.com/aquasecurity/trivy@v0.49.1 (CVE-2024-35192: Trivy possibly leaks registry credential when scanning images from malicious registries) (update to 0.51.2)

Check failure on line 9 in .examples/go.mod

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

.examples/go.mod#L9

Insecure dependency golang/github.com/dexidp/dex@v0.0.0-20200121184102-3b39c6440888 (CVE-2020-26290: Critical security issues in XML encoding in github.com/dexidp/dex) (update to 2.27.0)

Check warning on line 33 in config/trivy-utils.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

config/trivy-utils.go#L33

Method InstallTrivy has 79 lines of code (limit is 50)

Check failure on line 33 in config/trivy-utils.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

config/trivy-utils.go#L33

Method InstallTrivy has a cyclomatic complexity of 19 (limit is 10)

Check warning on line 38 in config/trivy-utils.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

config/trivy-utils.go#L38

Detected file permissions that are set to more than `0600` (user/owner can read and write). Setting file permissions to higher than `0600` is most likely unnecessary and violates the principle of least privilege.

Check warning on line 38 in config/trivy-utils.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

config/trivy-utils.go#L38

The application was found setting directory permissions to overly permissive values.

Check warning on line 113 in config/trivy-utils.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

config/trivy-utils.go#L113

Method  has a cyclomatic complexity of 9 (limit is 7)

Check warning on line 139 in config/trivy-utils.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

config/trivy-utils.go#L139

Detected file permissions that are set to more than `0600` (user/owner can read and write). Setting file permissions to higher than `0600` is most likely unnecessary and violates the principle of least privilege.

Check warning on line 139 in config/trivy-utils.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

config/trivy-utils.go#L139

The application was found setting file permissions to overly permissive values.

Check warning on line 166 in config/trivy-utils.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

config/trivy-utils.go#L166

Detected file permissions that are set to more than `0600` (user/owner can read and write). Setting file permissions to higher than `0600` is most likely unnecessary and violates the principle of least privilege.

Check warning on line 166 in config/trivy-utils.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

config/trivy-utils.go#L166

The application was found setting file permissions to overly permissive values.

Check warning on line 11 in tools/trivyRunner.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

tools/trivyRunner.go#L11

Method RunTrivy has a cyclomatic complexity of 10 (limit is 7)

Check failure on line 12 in tools/trivyRunner.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

tools/trivyRunner.go#L12

Detected non-static command inside Command.

Check failure on line 12 in tools/trivyRunner.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

tools/trivyRunner.go#L12

OS command injection is a critical vulnerability that can lead to a full system compromise as it may allow an adversary to pass in arbitrary commands or arguments to be executed.

Check notice on line 63 in tools/trivyRunner.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

tools/trivyRunner.go#L63

func TrivyJsonToSarif should be TrivyJSONToSarif

Check warning on line 105 in tools/trivyRunner.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

tools/trivyRunner.go#L105

The application was found setting file permissions to overly permissive values.