From ae55b387bfb658381c0fc1a2f0e968bc3985bd36 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Do=C4=9Fan=20Can=20Bak=C4=B1r?= Date: Tue, 10 Mar 2026 00:30:47 +0300 Subject: [PATCH 1/4] Add "Used By" section to README --- README.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/README.md b/README.md index 0e69117..a0059d1 100644 --- a/README.md +++ b/README.md @@ -145,6 +145,11 @@ Cross-validation results (10-fold, grouped by domain): Trained on 1000+ annotated web forms and 754 annotated web pages. +## Used By + +- [katana](https://github.com/projectdiscovery/katana) - A next-generation crawling and spidering framework +- [httpx](https://github.com/projectdiscovery/httpx) - A fast and multi-purpose HTTP toolkit + ## Contributing See [CONTRIBUTING.md](CONTRIBUTING.md). From 595e108385c5aea7db5d91a18ff2ca3fe2c65e0f Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Do=C4=9Fan=20Can=20Bak=C4=B1r?= Date: Mon, 23 Mar 2026 21:36:49 +0300 Subject: [PATCH 2/4] fix(ci): use golang/govulncheck-action to fix govulncheck panic govulncheck@latest panics on Go 1.25 due to an x/tools compatibility bug. Switch to the official govulncheck-action which manages versions. --- .github/workflows/ci.yml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index b7e9058..abc760a 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -59,8 +59,7 @@ jobs: - uses: actions/setup-go@v6 with: go-version-file: go.mod - - run: go install golang.org/x/vuln/cmd/govulncheck@latest - - run: govulncheck ./... + - uses: golang/govulncheck-action@v1 release: name: Release From a70be606daa8304c7354f74da1c95c6985db5945 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Do=C4=9Fan=20Can=20Bak=C4=B1r?= Date: Mon, 23 Mar 2026 21:45:03 +0300 Subject: [PATCH 3/4] fix(ci): pin govulncheck to v1.1.4 instead of using govulncheck-action The govulncheck-action@v1 runs its own internal checkout@v4 which conflicts with the outer checkout@v6, causing duplicate auth headers and a 400 error. Revert to manual install with a pinned version that is compatible with Go 1.25. --- .github/workflows/ci.yml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index abc760a..a13c7f0 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -59,7 +59,8 @@ jobs: - uses: actions/setup-go@v6 with: go-version-file: go.mod - - uses: golang/govulncheck-action@v1 + - run: go install golang.org/x/vuln/cmd/govulncheck@v1.1.4 + - run: govulncheck ./... release: name: Release From 8294be1707ad28e2747f6b3074df5df63ba2acc0 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Do=C4=9Fan=20Can=20Bak=C4=B1r?= Date: Mon, 23 Mar 2026 21:58:18 +0300 Subject: [PATCH 4/4] fix(ci): use govulncheck binary mode and bump Go to 1.25.8 govulncheck source mode panics on x/tools@v0.29.0 when analyzing go-json-experiment/json types with Go 1.25. Switch to binary mode to avoid SSA analysis. Also bump Go to 1.25.8 to fix GO-2026-4601. --- .github/workflows/ci.yml | 3 ++- go.mod | 2 +- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index a13c7f0..b225d85 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -59,8 +59,9 @@ jobs: - uses: actions/setup-go@v6 with: go-version-file: go.mod + - run: go build -o dit-bin ./cmd/dit - run: go install golang.org/x/vuln/cmd/govulncheck@v1.1.4 - - run: govulncheck ./... + - run: govulncheck -mode=binary dit-bin release: name: Release diff --git a/go.mod b/go.mod index 3e9ca21..1559853 100644 --- a/go.mod +++ b/go.mod @@ -1,6 +1,6 @@ module github.com/happyhackingspace/dit -go 1.25.7 +go 1.25.8 require ( github.com/PuerkitoBio/goquery v1.11.0