Skip to content
This repository was archived by the owner on Feb 27, 2026. It is now read-only.

Commit 4e8cdb0

Browse files
committed
Fix a couple of typos and remove an unused constant.
1 parent 8bed8a2 commit 4e8cdb0

File tree

3 files changed

+3
-4
lines changed

3 files changed

+3
-4
lines changed

docs/rules/g104_unchecked_erros.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: g104
33
title: G104: Audit errors not checked
44
---
55

6-
Really useful feature of Golang is the ability to return a tuple of a result and an error value from a function. There is an unspoken rule in Golang that the result of a function is unsafe until you make check the error value. Many security exploits can be performed when the error value is not checked.
6+
A really useful feature of Golang is the ability to return a tuple of a result and an error value from a function. There is an unspoken rule in Golang that the result of a function is unsafe until you make check the error value. Many security exploits can be performed when the error value is not checked.
77

88
## Example code:
99

docs/rules/g107_url_arg_to_http_request_as_taint_input.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,10 @@ id: g107
33
title: G107: Url provided to HTTP request as taint input
44
---
55

6-
Getting an URL from an untrusted source like user input gives the ability of an attacker to redirect your application to bad websites and perform additional attacks.
6+
Getting a URL from an untrusted source like user input gives the ability of an attacker to redirect your application to bad websites and perform additional attacks.
77
One of the examples is as shown below the [http.Get()](https://golang.org/pkg/net/http/#Client.Get) function issues a GET to the specified URL and if the result is appropriate GET will follow the redirect after calling Client's CheckRedirect function. That means that the attacker can send your application to various places.
88

9-
This problem can be used to achieve [SSRF](https://www.acunetix.com/blog/articles/server-side-request-forgery-vulnerability/) atttacks via http requests with variable url.
9+
This problem can be used to achieve [SSRF](https://www.acunetix.com/blog/articles/server-side-request-forgery-vulnerability/) attacks via http requests with variable url.
1010

1111
## Example problematic code:
1212

website/core/Footer.js

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ class Footer extends React.Component {
1919
}
2020

2121
render() {
22-
const currentYear = new Date().getFullYear();
2322
return (
2423
<footer className="nav-footer" id="footer">
2524
<section className="sitemap">

0 commit comments

Comments
 (0)