diff --git a/README.md b/README.md index afb51dbb4d..7ca80987ea 100644 --- a/README.md +++ b/README.md @@ -50,7 +50,7 @@ or to specify a set of rules to explicitly exclude using the '-exclude=' flag. - G303: Creating tempfile using a predictable path - G304: File path provided as taint input - G305: File traversal when extracting zip archive - - G401: Detect the usage of DES, RC4, or MD5 + - G401: Detect the usage of DES, RC4, MD5 or SHA1 - G402: Look for bad TLS connection settings - G403: Ensure minimum RSA key length of 2048 bits - G404: Insecure random number source (rand) @@ -58,6 +58,7 @@ or to specify a set of rules to explicitly exclude using the '-exclude=' flag. - G502: Import blacklist: crypto/des - G503: Import blacklist: crypto/rc4 - G504: Import blacklist: net/http/cgi + - G505: Import blacklist: crypto/sha1 ``` diff --git a/rules/rulelist.go b/rules/rulelist.go index 8c76a323b5..e9685b9ef6 100644 --- a/rules/rulelist.go +++ b/rules/rulelist.go @@ -80,7 +80,7 @@ func Generate(filters ...RuleFilter) RuleList { {"G305", "File path traversal when extracting zip archive", NewArchive}, // crypto - {"G401", "Detect the usage of DES, RC4, or MD5", NewUsesWeakCryptography}, + {"G401", "Detect the usage of DES, RC4, MD5 or SHA1", NewUsesWeakCryptography}, {"G402", "Look for bad TLS connection settings", NewIntermediateTLSCheck}, {"G403", "Ensure minimum RSA key length of 2048 bits", NewWeakKeyStrength}, {"G404", "Insecure random number source (rand)", NewWeakRandCheck},