Skip to content
#

static-code-analysis

Here are 429 public repositories matching this topic...

dvandersluis
dvandersluis commented Sep 16, 2021
~/code/rubocop$ grep -iro "autocorrect" . | wc -l
    1971
~/code/rubocop$ grep -iro "auto-correct" . | wc -l
    1551

Both autocorrect and auto-correct are used frequently in RuboCop. Should we be consistent? If so, which one?

Any change should only affect comments and other string content, not method names.

good first issue
semgrep
bstpierre
bstpierre commented Mar 26, 2022

Describe the bug
Patterns for Go multiple return values match more strictly than the argument list, which is confusing.

To Reproduce
Try to match any Go function that has error in the return type list. All six of these functions should match:

func a(b int) error { return nil }
func b() (int, error) { return 0, nil }
func c() (error, int) { return nil, 0 }
func d() (float6
good first issue priority:low user:external lang:golang
datree
royhadad
royhadad commented Mar 29, 2022

Is your feature request related to a problem? Please describe.
We have a file pkg/policy/defaultRules.yaml - which is the source of truth for the default rules in users' policies.
It's very important we don't break it, therefore - better testing is required.
A quick win would be to test and validate the structure of the yaml

Describe the solution you'd like
Add a test file **pkg/pol

enhancement good first issue WIP testing
reviewdog
davidak
davidak commented Jun 18, 2018

Describe the bug
A clear and concise description of what the bug is.

To Reproduce
Steps to reproduce the behavior:

  1. create .bandit file with content:
[bandit]
tests: B101,B102,B301

  1. run bandit -c .bandit -r module/
  2. get error:
    [main] ERROR .bandit : Error parsing file.

Expected behavior
working as described in readme

Bandit version

ba
bug good first issue
DudeNr33
DudeNr33 commented Apr 3, 2022

Bug description

Two issues with bad-string-format-type:

  1. Just like bad-format-character the bad-string-format-type message is currently only raised for old-style string formatting.
  2. If only a single value needs to be formatted, the check does not work if the value to format is passed in as a variable. Using variables in tuples however is fine.

Given a file a.py:

Bug 🪳 Help Wanted 🙏 good first issue False Negative 🦋
Fernal73
Fernal73 commented Sep 1, 2019

Affects PMD Version:
6.17

Rule:
All rulesets.

Description:
PMD output does not inform the user as to the number of rules contravened while running the tool. The user has to look at the output file.

Code Sample demonstrating the issue:

Sep 01, 2019 9:42:45 AM net.sourceforge.pmd.cache.FileAnalysisCache loadFromFile
INFO: Analysis cache loaded
Sep 01, 2019 9:
an:enhancement good first issue
revive
SamuelCabralCruz
SamuelCabralCruz commented Jan 5, 2022

Is your feature request related to a problem? Please describe.
It would be nice that imports-blacklist rule supports regex or match any sub-packages.

Describe the solution you'd like
adding
[rule.imports-blacklist]
arguments = ["github.com/pkgA/pkgB", "github.com/pkg1/**/pkg2"]
configuration would prevent following imports:
import "github.com/pkgA/pkgB"
import "github.com/pkgA

msridhar
msridhar commented Jan 22, 2022

This would allow for more localized suppressions. Say we have a method foo(Object o) in an annotated third-party library where o has no type annotation, but o really should be @Nullable, as foo() can handle being passed null as a parameter. In code checked by NullAway, say you write:

void bigMethod() {
  ...
  foo(null); // NullAway reports an error
  ...
}

I beli

FullValueRider
FullValueRider commented Dec 10, 2021

Rubberduck version information
The info below can be copy-paste-completed from the first lines of Rubberduck's log or the About box:

Rubberduck version [Version 2.5.2.6030
OS: Microsoft Windows NT 10.0.22000.0, x64
Host Product: Microsoft Office x64
Host Version: 16.0.14701.20226
Host Executable: WINWORD.EXE

Description
Language inspection for assignment of LCase suggests usi

bug enhancement feature-inspections up-for-grabs

Improve this page

Add a description, image, and links to the static-code-analysis topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the static-code-analysis topic, visit your repo's landing page and select "manage topics."

Learn more