[GH#441] [Future]Tech Debt: Harden gosec security scanning (PR #437 follow-up) #20
Labels
No labels
area/architecture
area/audio
area/coach
area/frontend
area/recording
area/replay
area/runtime
area/settings
area/sync
area/telemetry
area/voicecontrol
ci
dependency/child
dependency/parent
lane:balanced
lane:fast
needs-info
needs/decision
pre-mvp
priority:p1
priority:p2
priority:p3
release
release-blocker
risk:low
size/large
size/medium
size/xlarge
status:planned
status:triage
teammanager
type/chore
type/research
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
Max/strategy-desktop#20
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Migrated from GitHub #441
Originally created by @Bio1988 on 2026-05-07T06:10:37Z
Problem
The security scanning pipeline introduced in PR #437 currently excludes several gosec rules and filters by severity
highonly. This was necessary to get CI green on pre-existing code, but these should be addressed and re-enabled.Current Exclusions
gosec rules excluded via CLI
-exclude:#nosec G101annotations for legitimate false positives, fix real ones.#nosecannotations with justification#nosecif unreachableSeverity filter:
-severity high— medium and low findings are silently droppedProposed Plan
-severity highfilter — let all severities throughgosec ./...locally, triage all findings#nosecannotation with documented reason.golangci.ymlto also run gosec (currently only in CI script)References