fix: suppress gosec G704 SSRF false positive on webhook URLs from config
The webhook/ntfy URLs come from validated application configuration, not user input. gosec G704 (new in gosec 2.23.0) taint analysis cannot distinguish config-provided URLs from user-controlled input.
This commit is contained in:
parent
144a2df665
commit
9b97d41f18
@ -147,7 +147,7 @@ func (svc *Service) sendNtfy(
|
||||
request.Header.Set("Title", title)
|
||||
request.Header.Set("Priority", ntfyPriority(priority))
|
||||
|
||||
resp, err := svc.client.Do(request)
|
||||
resp, err := svc.client.Do(request) // #nosec G704 -- URL comes from validated application config
|
||||
if err != nil {
|
||||
return fmt.Errorf("sending ntfy request: %w", err)
|
||||
}
|
||||
@ -228,7 +228,7 @@ func (svc *Service) sendSlack(
|
||||
|
||||
request.Header.Set("Content-Type", "application/json")
|
||||
|
||||
resp, err := svc.client.Do(request)
|
||||
resp, err := svc.client.Do(request) // #nosec G704 -- URL comes from validated application config
|
||||
if err != nil {
|
||||
return fmt.Errorf("sending webhook request: %w", err)
|
||||
}
|
||||
|
||||
Loading…
Reference in New Issue
Block a user