gosec
Inspecting source code for security problems by scanning the Go AST. Rules can be found on the tool’s Github page. Unfortunately, the recursive scan is not yet available on this platform, but it’s going to be implemented in the future.
Name:gosec
Category:Static Code Analysis
Publisher:trickest
Created:6/23/2021
Container:
quay.io/trickest/gosec:v2.7.0
Output Type:
License:Unknown
Source:View Source
Parameters
-tags
Comma separated list of build tags.-nosec
Ignores #nosec comments when set.-quiet
Only show output when errors are found.-tests
Scan tests files.
Target directory to scan.-exclude
Comma separated list of rules IDs to exclude (rule list can be viewed on tool's Github page).-include
Comma separated list of rules IDs to include (rule list can be viewed on tool's Github page).-no-fail
Do not fail the scanning, even if issues were found.-severity
Filter out the issues with a lower severity than the given value. Valid options are: low, medium, high (default: low).-nosec-tag
Set an alternative string for #nosec. Some examples: #dontanalyze, #falsepositive.-confidence
Filter out the issues with a lower confidence than the given value. Valid options are: low, medium, high (default: low).-conf
Optional config file.-exclude-dir
Exclude folder from scan (can be specified multiple times).-fmt
Set output format. Valid options are: json, yaml, csv, junit-xml, html, sonarqube, golint, sarif or text (default: text).