diff --git a/.golangci.next.reference.yml b/.golangci.next.reference.yml index c15f96d84d54..2d4c9e10e009 100644 --- a/.golangci.next.reference.yml +++ b/.golangci.next.reference.yml @@ -874,7 +874,6 @@ linters-settings: - G504 # Import blocklist: net/http/cgi - G505 # Import blocklist: crypto/sha1 - G601 # Implicit memory aliasing of items from a range statement - - G602 # Slice access out of bounds # To specify a set of rules to explicitly exclude. # Available rules: https://github.com/securego/gosec#available-rules @@ -914,7 +913,6 @@ linters-settings: - G504 # Import blocklist: net/http/cgi - G505 # Import blocklist: crypto/sha1 - G601 # Implicit memory aliasing of items from a range statement - - G602 # Slice access out of bounds # Exclude generated files # Default: false diff --git a/.golangci.reference.yml b/.golangci.reference.yml index c15f96d84d54..2d4c9e10e009 100644 --- a/.golangci.reference.yml +++ b/.golangci.reference.yml @@ -874,7 +874,6 @@ linters-settings: - G504 # Import blocklist: net/http/cgi - G505 # Import blocklist: crypto/sha1 - G601 # Implicit memory aliasing of items from a range statement - - G602 # Slice access out of bounds # To specify a set of rules to explicitly exclude. # Available rules: https://github.com/securego/gosec#available-rules @@ -914,7 +913,6 @@ linters-settings: - G504 # Import blocklist: net/http/cgi - G505 # Import blocklist: crypto/sha1 - G601 # Implicit memory aliasing of items from a range statement - - G602 # Slice access out of bounds # Exclude generated files # Default: false diff --git a/jsonschema/golangci.jsonschema.json b/jsonschema/golangci.jsonschema.json index 16c7f557e940..510740d61660 100644 --- a/jsonschema/golangci.jsonschema.json +++ b/jsonschema/golangci.jsonschema.json @@ -157,8 +157,7 @@ "G503", "G504", "G505", - "G601", - "G602" + "G601" ] }, "govet-analyzers": { diff --git a/jsonschema/golangci.next.jsonschema.json b/jsonschema/golangci.next.jsonschema.json index 16c7f557e940..510740d61660 100644 --- a/jsonschema/golangci.next.jsonschema.json +++ b/jsonschema/golangci.next.jsonschema.json @@ -157,8 +157,7 @@ "G503", "G504", "G505", - "G601", - "G602" + "G601" ] }, "govet-analyzers": { diff --git a/pkg/golinters/gosec/gosec.go b/pkg/golinters/gosec/gosec.go index c333152e69c6..0a484a94b2c6 100644 --- a/pkg/golinters/gosec/gosec.go +++ b/pkg/golinters/gosec/gosec.go @@ -77,6 +77,7 @@ func runGoSec(lintCtx *linter.Context, pass *analysis.Pass, settings *config.GoS } analyzer.CheckRules(pkg) + analyzer.CheckAnalyzers(pkg) secIssues, _, _ := analyzer.Report() if len(secIssues) == 0 {