Skip to content

Fix CI: update setup-go version 1.23→1.25 to match go.mod #88

Fix CI: update setup-go version 1.23→1.25 to match go.mod

Fix CI: update setup-go version 1.23→1.25 to match go.mod #88

Triggered via push March 14, 2026 22:06
Status Failure
Total duration 54s
Artifacts

ci.yml

on: push
Python Test & Lint
30s
Python Test & Lint
Shell Script Lint
5s
Shell Script Lint
Validate YAML configs
7s
Validate YAML configs
Verify action pins
5s
Verify action pins
Supply Chain & SBOM Verification
35s
Supply Chain & SBOM Verification
Security Regression Tests
41s
Security Regression Tests
Test Count Drift Check
39s
Test Count Drift Check
Dependency Vulnerability Audit
46s
Dependency Vulnerability Audit
Documentation Validation
4s
Documentation Validation
Matrix: Go Build & Test
Fit to window
Zoom out
Zoom in

Annotations

2 errors and 8 warnings
Dependency Vulnerability Audit
Process completed with exit code 1.
Dependency Vulnerability Audit
flask: GHSA-68rp-wp8r-4726 — When the `session` object is accessed, Flask should set the `Vary: Cookie` header. This instructs caches not to cache the response, as it may contain information specific to a logged in user. This is handled in most cases, but some forms of access such as the Python `in` operator were overlooked. The severity depends on the application's use of the session, and the cache's behavior regarding cookies. The risk depends on all these conditions being met. 1. The application must be hosted behind a caching proxy that does not ignore responses with cookies. 2. The application does not set a `Cache-Control` header to indicate that a page is private or should not be cached. 3. The application accesses the session in a way that does not access the values, only the keys, and does not mutate the session.
Python Test & Lint
services/quarantine/quarantine/watcher.py:178: [MEDIUM] Audit url open for permitted schemes. Allowing use of file:/ or custom schemes is often unexpected.
Python Test & Lint
services/quarantine/quarantine/pipeline.py:1437: [MEDIUM] Audit url open for permitted schemes. Allowing use of file:/ or custom schemes is often unexpected.
Python Test & Lint
services/agent/agent/sandbox.py:403: [MEDIUM] Probable insecure usage of temp file/directory.
Python Test & Lint
services/agent/agent/app.py:555: [MEDIUM] Chmod setting a permissive mask 0o660 on file (sock_path).
Supply Chain & SBOM Verification
Restore cache failed: Dependencies file is not found in /home/runner/work/SecAI_OS/SecAI_OS. Supported file pattern: go.mod
Test Count Drift Check
Restore cache failed: Dependencies file is not found in /home/runner/work/SecAI_OS/SecAI_OS. Supported file pattern: go.mod
Security Regression Tests
Restore cache failed: Dependencies file is not found in /home/runner/work/SecAI_OS/SecAI_OS. Supported file pattern: go.mod
Dependency Vulnerability Audit
Restore cache failed: Dependencies file is not found in /home/runner/work/SecAI_OS/SecAI_OS. Supported file pattern: go.mod