Happy to announce that we are releasing – 5 new security issues, 3 new Autofixes and simpler configuration for our Go analyzer. ![]()
What’s New?
DeepSource’s Go analyzer now fully covers OWASP’s Top Ten security risk categories. Also, configuring the Go analyzer to your repository is easier than before – no need to manually configure import_paths; just configure import_root and you’re done! And yes, 3 new Autofixes have been added to the Go analyzer.
Features
- Add new security rule: Detect exposure of sensitive headers (GO-S0901, OWASP A6)
- Add new security rule: Detect usage of insecure gRPC server (GO-S0902, OWASP A8)
- Add new security rule: Detect XML package usage vulnerable to XXE attacks (GO-S0903, OWASP A4)
- Add new security rule: Detect possible usage of Logger for infected user defined data (GO-S0904, OWASP [A1, A10])
- Add new security rule: Detect usage of
encoding/xml– not safe by design for security-critical operation (GO-S0905, OWASP [A2, A9]) - Add new Autofix: Use plain channel send or receive (SCC-S1000)
- Add new Autofix: Function call can be replaced with helper function (CRT-A0010)
- Add new Autofix: Types of function parameters can be combined (CRT-A0017)
- Configuring Go analyzer is much “simpler” than before – now a single “import_root” field is required. Previously “import_paths” array was mandatory along with “import_root” (in case of multiple
import_paths). New change in configuration is backward compatible.