fix(security): suppress gosec false positives G703 and G118 (#136)

This commit is contained in:
Copilot
2026-03-15 17:59:43 +02:00
committed by GitHub
parent 26c75fc2da
commit c5b81d04b6
6 changed files with 16 additions and 17 deletions

View File

@@ -57,14 +57,6 @@ func ContainsPathTraversal(input string) bool {
// The returned patterns include both production patterns (real attack signatures)
// and test sentinels (used exclusively in test fixtures for validation).
func GetDangerousCommandPatterns() []string {
// Production patterns: Real command injection and SQL injection signatures
productionPatterns := []string{
"rm -rf", // Destructive file operations
"drop table", // SQL injection attempts
"'; cat", // Command injection with file reads
"/etc/passwd", "/etc/shadow", // Specific sensitive file access
}
// Test sentinels: Markers used exclusively in test fixtures
// These help verify pattern detection logic in tests
testSentinels := []string{
@@ -84,6 +76,16 @@ func GetDangerousCommandPatterns() []string {
"DANGEROUS_EVAL_FUNCTION",
}
// Combine both lists for backward compatibility
return append(productionPatterns, testSentinels...)
// Production patterns: Real command injection and SQL injection signatures
productionPatterns := []string{
"rm -rf", // Destructive file operations
"drop table", // SQL injection attempts
"'; cat", // Command injection with file reads
"/etc/passwd", "/etc/shadow", // Specific sensitive file access
}
// Combine both lists for backward compatibility; preallocate to avoid reallocation
combined := make([]string, 0, len(productionPatterns)+len(testSentinels))
combined = append(combined, productionPatterns...)
return append(combined, testSentinels...)
}