8000 Remove second title (#10) · securego/securego.github.io@5518ade · GitHub
[go: up one dir, main page]

Skip to content

Commit 5518ade

Browse files
MVrachevgcmurphy
authored andcommitted
Remove second title (#10)
The titles are two on every single rule. I remove that. Signed-off-by: Martin Vrachev <mvrachev@vmware.com>
1 parent 89b4ed6 commit 5518ade

File tree

4 files changed

+0
-8
lines changed

4 files changed

+0
-8
lines changed

docs/rules/g101_hardcoded_credentials.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@ id: g101
33
title: G101: Hardcoded credentials
44
---
55

6-
# G101: Hardcoded credentials
7-
86
The use of hard-coded passwords increases the possibility of password guessing tremendously. This plugin test looks for all string literals and checks the following conditions:
97

108
Variables are considered to look like a password if they have match any one of:

docs/rules/g102_bind_all_interfaces.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@ id: g102
33
title: G102: Bind to all interfaces
44
---
55

6-
# G102: Bind to all interfaces
7-
86
Binding to all network interfaces can potentially open up a service to traffic on unintended interfaces, that may not be properly documented or secured. This plugin test looks for a string pattern “0.0.0.0” that may indicate a hardcoded binding to all network interfaces.
97

108
## Example code:

docs/rules/g103_use_of_unsage_block.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@ id: g103
33
title: G103: Use of unsafe block
44
---
55

6-
# G103: Use of unsafe block
7-
86
Using the unsafe package in Go gives you low-level memory management and many of the strength of the C language but also gives flexibility to the attacker of your application. The pointer arithmetic is one of the examples from the unsafe package which can be used for data leak, memory corruption or even execution of attackers own script.
97

108
Also, you should keep in mind that the "unsafe" package is not protected by [Go 1 compatibility guidelines](https://golang.org/doc/go1compat).

docs/rules/g104_unchecked_erros.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@ id: g104
33
title: G104: Audit errors not checked
44
---
55

6-
# G104: Audit errors not checked
7-
86
Really useful feature of Golang is the ability to return a tuple of a result and an error value from a function. There is an unspoken rule in Golang that the result of a function is unsafe until you make check the error value. Many security exploits can be performed when the error value is not checked.
97

108
## Example code:

0 commit comments

Comments
 (0)
0