Address some CodeQL security concerns#35572
Conversation
| if err != nil { | ||
| return err | ||
| } | ||
| // codeql[disable-next-line=go/clear-text-logging] |
There was a problem hiding this comment.
It's a shame that CodeQL doesn't support such inline-disabling. I was cheated by AI.
CodeQL is missing an inline mechanism to suppress warnings github/codeql#11427
There was a problem hiding this comment.
Never blindly trust AI, always verify 😆
There was a problem hiding this comment.
Yup, I never blindly trust AI. But at the moment I don't have a way to test the CodeQL related changes locally. So after the merge, I checked the result immediately .....
If anyone knows to how to test CodeQL locally, please suggest. 🙏
There was a problem hiding this comment.
It seems there is a codeql cli, but it requires some setup and a "database" being generated:
https://medium.com/@arjun_zs/codeql-cli-running-in-local-the-how-5817175300c6
Maybe we can add a make codeql that does it all.
Although there is no real security problem
Although there is no real security problem
* giteaofficial/main: fix: auto-expand and auto-scroll for actions logs (go-gitea#35570) (go-gitea#35583) [skip ci] Updated translations via Crowdin [skip ci] Updated translations via Crowdin Fix creating pull request failure when the target branch name is the same as some tag (go-gitea#35552) Use bundled version of spectral (go-gitea#35573) Add rebase push display wrong comments bug (go-gitea#35560) Address some CodeQL security concerns (go-gitea#35572) fix(webhook): prevent tag events from bypassing branch filters targets go-gitea#35449 (go-gitea#35567) Added button to copy file name in PR files (go-gitea#35509) Update JS and PY deps (go-gitea#35565) Enable a few more tsconfig options (go-gitea#35553) Bump github.com/wneessen/go-mail from 0.6.2 to 0.7.1 (go-gitea#35557) add more routes to the "expensive" list (go-gitea#35547) Drop json-iterator dependency (go-gitea#35544) Add proper error message if session provider can not be created (go-gitea#35520) use experimental go json v2 library (go-gitea#35392) Use global lock instead of status pool for cron lock (go-gitea#35507) Move some functions to gitrepo package (go-gitea#35503) Move GetDiverging functions to gitrepo (go-gitea#35524) [skip ci] Updated translations via Crowdin
Although there is no real security problem