Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade: Bump github.com/open-policy-agent/opa from 0.67.1 to 0.68.0 #167

Upgrade: Bump github.com/open-policy-agent/opa from 0.67.1 to 0.68.0

64a4506
Select commit
Loading
Failed to load commit list.
Closed

Upgrade: Bump github.com/open-policy-agent/opa from 0.67.1 to 0.68.0 #167

Upgrade: Bump github.com/open-policy-agent/opa from 0.67.1 to 0.68.0
64a4506
Select commit
Loading
Failed to load commit list.
DryRunSecurity / Sensitive Files Analyzer succeeded Oct 1, 2024 in 1s

DryRun Security

Details

Sensitive Files Analyzer Findings: 2 detected

⚠️ Potential Sensitive File go.mod (click for details)
Type Potential Sensitive File
Description Golang applications manage their dependencies through their go.mod and go.sum files. A change in these files may indicate an addition of a library/dependency which could introduce additional risk to the application either through vulnerable code, expansion of the application's attack surface via additional routes, or malicious code.
Filename go.mod
CodeLink

genval/go.mod

Lines 13 to 19 in 64a4506

github.com/hashicorp/hcl/v2 v2.21.0
github.com/jedib0t/go-pretty/v6 v6.5.9
github.com/joho/godotenv v1.5.1
github.com/open-policy-agent/opa v0.68.0
github.com/sigstore/cosign/v2 v2.4.0
github.com/sigstore/sigstore v1.8.8
github.com/sirupsen/logrus v1.9.3
⚠️ Potential Sensitive File go.sum (click for details)
Type Potential Sensitive File
Description Golang applications manage their dependencies through their go.mod and go.sum files. A change in these files may indicate an addition of a library/dependency which could introduce additional risk to the application either through vulnerable code, expansion of the application's attack surface via additional routes, or malicious code.
Filename go.sum
CodeLink

genval/go.sum

Lines 492 to 499 in 64a4506

github.com/kevinburke/ssh_config v1.2.0/go.mod h1:CT57kijsi8u/K/BOFA39wgDQJ9CxiF4nAY/ojJ6r6mM=
github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8=
github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
github.com/klauspost/compress v1.17.9 h1:6KIumPrER1LHsvBVuDa0r5xaG0Es51mhhB9BQB2qeMA=
github.com/klauspost/compress v1.17.9/go.mod h1:Di0epgTjJY877eYKx5yC51cX2A2Vl2ibi7bDH9ttBbw=
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE=
github.com/kr/pretty v0.3.1/go.mod h1:hoEshYVHaxMs3cyo3Yncou5ZscifuDolrwPKZanG3xk=