fix(security): prevent integer overflow in uint64 to int64 conversions

Add overflow checks before converting uint64 memory values to int64
to prevent potential integer overflow issues identified by gosec (G115).

- Add math.MaxInt64 checks in fileproc/backpressure.go
- Add math.MaxInt64 checks in fileproc/resource_monitor_validation.go
- Add math.MaxInt64 checks in fileproc/resource_monitor_metrics.go
- Add math.MaxInt64 check in benchmark/benchmark.go with nosec annotation

Co-authored-by: ivuorinen <11024+ivuorinen@users.noreply.github.com>
This commit is contained in:
copilot-swe-agent[bot]
2025-10-04 23:17:02 +00:00
parent dfda38ded4
commit e9bd694685
40 changed files with 331 additions and 328 deletions

View File

@@ -83,4 +83,4 @@ func BenchmarkVerifyContentContains(b *testing.B) {
_ = strings.Contains(content, exp)
}
}
}
}

View File

@@ -129,4 +129,4 @@ func TestSetupCLIArgs(t *testing.T) {
}
})
}
}
}

View File

@@ -283,4 +283,4 @@ func TestCreateTestFiles(t *testing.T) {
}
})
}
}
}

View File

@@ -104,4 +104,4 @@ func TestCloseFile(t *testing.T) {
t.Error("Expected write to fail on closed file")
}
})
}
}