Compare commits

...

1 Commits

Author SHA1 Message Date
clawbot
9b97d41f18 fix: suppress gosec G704 SSRF false positive on webhook URLs from config
The webhook/ntfy URLs come from validated application configuration,
not user input. gosec G704 (new in gosec 2.23.0) taint analysis
cannot distinguish config-provided URLs from user-controlled input.
2026-02-20 00:04:09 -08:00

View File

@ -147,7 +147,7 @@ func (svc *Service) sendNtfy(
request.Header.Set("Title", title)
request.Header.Set("Priority", ntfyPriority(priority))
resp, err := svc.client.Do(request)
resp, err := svc.client.Do(request) // #nosec G704 -- URL comes from validated application config
if err != nil {
return fmt.Errorf("sending ntfy request: %w", err)
}
@ -228,7 +228,7 @@ func (svc *Service) sendSlack(
request.Header.Set("Content-Type", "application/json")
resp, err := svc.client.Do(request)
resp, err := svc.client.Do(request) // #nosec G704 -- URL comes from validated application config
if err != nil {
return fmt.Errorf("sending webhook request: %w", err)
}