Changes to run laconic-console app with laconicd #75

Merged
nikugogoi merged 5 commits from console into main 2023-01-11 07:36:43 +00:00
Showing only changes of commit ea76ad75a5 - Show all commits

View File

@ -1,8 +1,6 @@
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
package gql
import (
"bytes"
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
"fmt"
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
"html/template"
"net/http"
)
@ -12,23 +10,10 @@ import (
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
//
// For more information, see https://github.com/graphql/graphiql.
func respond(w http.ResponseWriter, body []byte, code int) {
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
w.Header().Set("Content-Type", "application/json; charset=utf-8")
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
w.Header().Set("X-Content-Type-Options", "nosniff")
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
w.WriteHeader(code)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
_, _ = w.Write(body)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
}
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
func errorJSON(msg string) []byte {
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
buf := bytes.Buffer{}
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
fmt.Fprintf(&buf, `{"error": "%s"}`, msg)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
return buf.Bytes()
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
}
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
func PlaygroundHandler(apiURL string) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
if r.Method != "GET" {
respond(w, errorJSON("only GET requests are supported"), http.StatusMethodNotAllowed)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
http.Error(w, "only GET requests are supported", http.StatusMethodNotAllowed)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
return
}
w.Header().Set("Content-Type", "text/html")
@ -158,7 +143,6 @@ var page = template.Must(template.New("graphiql").Parse(`
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
ReactDOM.render(
React.createElement(GraphiQL, {
fetcher: GraphiQL.createFetcher({
// subscriptionUrl: 'ws://localhost:8081/subscriptions',
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
url: {{.apiURL}}
}),
query: parameters.query,

github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)