>>> go vet ./src/*.go# command-line-arguments# [command-line-arguments]vet: src/proxy_windows.go:16:6: sh redeclared in this block
Use govulncheck:
#Install#go install golang.org/x/vuln/cmd/govulncheck@latest#Run on Source Code>>> govulncheck ./...No vulnerabilities found.#Run on a Binary>>> govulncheck -mode binary -show verbose `which fzf`Scanning your binary for known vulnerabilities...Fetching vulnerabilities from the database...Checking the binary against the vulnerabilities...No vulnerabilities found.
Use Staticcheck:
#Install#go install honnef.co/go/tools/cmd/staticcheck@latest#Run>>> staticcheck ./...src/terminal.go:330:2: field sigstop is unused (U1000)
src/tui/light.go:107:2: field ttyinChannel is unused (U1000)
src/tui/light.go:108:2: field inHandle is unused (U1000)
src/tui/light.go:109:2: field outHandle is unused (U1000)
src/tui/light.go:110:2: field origStateInput is unused (U1000)
src/tui/light.go:111:2: field origStateOutput is unused (U1000)
src/winpty.go:12:20: error strings should not be capitalized (ST1005)