You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Golang Security team has developed a new tool to detect vulnerable packages in Golang code and it will be a great addition to huskyCI analysis.
It would be great if
We have all the necessary code to run this scan!
What we expect
A working container of Govulncheck that outputs a JSON after running the analysis in a particular folder. Similar to this to be uploaded to Docker Hub as huskyci/govulncheck:latest.
Add into config.yaml commands needed to run inside the securityTest container.
Adjust context.go to have the new Govulncheck securityTest configs.
Add new error messages related to Govulncheck in messagecodes.go.
Add a new file into securitytest package and adjust its logic to now handle Govulncheck output.
Motivation
Golang Security team has developed a new tool to detect vulnerable packages in Golang code and it will be a great addition to huskyCI analysis.
It would be great if
We have all the necessary code to run this scan!
What we expect
huskyci/govulncheck:latest
.config.yaml
commands needed to run inside the securityTest container.context.go
to have the new Govulncheck securityTest configs.messagecodes.go
.securitytest
package and adjust its logic to now handle Govulncheck output.Tips
The text was updated successfully, but these errors were encountered: