Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adopt static code analysis with security verification #455

Closed
jpkrohling opened this issue Oct 6, 2017 · 4 comments · Fixed by #830
Closed

Adopt static code analysis with security verification #455

jpkrohling opened this issue Oct 6, 2017 · 4 comments · Fixed by #830
Assignees

Comments

@jpkrohling
Copy link
Contributor

Adopt a static code analysis that can also verify common security problems. One possible candidate is https://github.com/alecthomas/gometalinter .

This is part of #404 .

@jpkrohling
Copy link
Contributor Author

gometalinter provides too much feedback. It would probably be better to focus first on a tool that does only security analysis, like Gas:

$ gas -exclude=G104 ./...
.
.
.
Summary:
   Files: 264
   Lines: 32020
   Nosec: 0
  Issues: 8

Of the 8 issues, 4 are related to the hotrod example, three are G304 (which seem OK at a first glance), and one is G103, related to a test utilility.

G104 is "Errors unhandled", and happens in 154 places.

@jpkrohling
Copy link
Contributor Author

Could someone please assign this to me?

@yurishkuro
Copy link
Member

@jpkrohling the ticket #455 mentioned that it's part of this ticket, but there is no checklist here. Do we just go by the tickets in the milestone, or is there something else? I'm just trying to get the full picture, what's outstanding for completion.

@jpkrohling
Copy link
Contributor Author

The milestone is accurate. We actually need only #456 to get a "passing" state and I'm expecting @PikBot to help us on that.

The status can be seen by clicking on the badge on the main readme file, or here:
https://bestpractices.coreinfrastructure.org/en/projects/1273

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants