SonarSource Rules
  • Products

    In-IDE

    Code Quality and Security in your IDE with SonarQube Ide

    IDE extension that lets you fix coding issues before they exist!

    Discover SonarQube for IDE

    SaaS

    Code Quality and Security in the cloud with SonarQube Cloud

    Setup is effortless and analysis is automatic for most languages

    Discover SonarQube Cloud

    Self-Hosted

    Code Quality and Security Self-Hosted with SonarQube Server

    Fast, accurate analysis; enterprise scalability

    Discover SonarQube Server
  • SecretsSecrets
  • ABAPABAP
  • AnsibleAnsible
  • ApexApex
  • AzureResourceManagerAzureResourceManager
  • CC
  • C#C#
  • C++C++
  • CloudFormationCloudFormation
  • COBOLCOBOL
  • CSSCSS
  • DartDart
  • DockerDocker
  • FlexFlex
  • GitHub ActionsGitHub Actions
  • GoGo
  • HTMLHTML
  • JavaJava
  • JavaScriptJavaScript
  • JSONJSON
  • JCLJCL
  • KotlinKotlin
  • KubernetesKubernetes
  • Objective CObjective C
  • PHPPHP
  • PL/IPL/I
  • PL/SQLPL/SQL
  • PythonPython
  • RPGRPG
  • RubyRuby
  • RustRust
  • ScalaScala
  • ShellShell
  • SwiftSwift
  • TerraformTerraform
  • TextText
  • TypeScriptTypeScript
  • T-SQLT-SQL
  • VB.NETVB.NET
  • VB6VB6
  • XMLXML
  • YAMLYAML
Go

Go static code analysis

Unique rules to find Bugs, Vulnerabilities, Security Hotspots, and Code Smells in your GO code

  • All rules 94
  • Vulnerability21
  • Bug13
  • Security Hotspot14
  • Code Smell46
Filtered: 3 rules found
error-handling
    Impact
      Clean code attribute
        1. Custom error types must implement "Error()" method correctly

           Bug
        2. Functions should follow Go's explicit error handling patterns

           Code Smell
        3. Delivering code in production with debug features activated is security-sensitive

           Security Hotspot

        Functions should follow Go's explicit error handling patterns

        consistency - conventional
        reliability
        maintainability
        Code Smell
        • convention
        • error-handling

        This is an issue when code ignores errors, uses non-idiomatic control flow patterns, or attempts to implement exception-like error handling instead of Go’s conventional explicit error returns.

        Why is this an issue?

        How can I fix it?

        More Info

        Go was designed with explicit error handling as a core philosophy to make error conditions visible and force developers to consciously decide how to handle them. This approach leads to more reliable and maintainable code.

        When errors are ignored using the blank identifier (_), potential failures become invisible, making debugging difficult and potentially causing silent failures in production. This goes against Go’s principle of making errors explicit and handling them at the point where they occur.

        Non-idiomatic patterns like unnecessary else clauses after error checks or using panic/recover for normal error flow make code less familiar to Go developers. These patterns increase cognitive load because they don’t follow the established conventions that Go developers expect.

        Abstraction layers that wrap Go’s error handling in complex patterns (like Result types or generic error handlers) hide the explicit nature of Go’s error handling, making code harder to understand and debug. Go’s simple error interface and explicit returns are designed to be clear and direct.

        The idiomatic Go approach of checking errors immediately after function calls and returning them explicitly creates a clear error flow that’s easy to follow and debug. This pattern is so common in Go that it becomes second nature to experienced developers.

        What is the potential impact?

        Ignoring errors can lead to silent failures, data corruption, or unexpected application behavior in production. Non-idiomatic error handling patterns make code harder to maintain and review, especially for teams with varying Go experience levels.

        When errors are not handled explicitly, debugging becomes significantly more difficult because error conditions are not visible in the code flow. This can result in longer development cycles and more production issues.

        Using exception-like patterns in Go can mask the true source of errors and make it unclear where failures might occur, reducing the reliability benefits that Go’s explicit error handling provides.

          Available In:
        • SonarQube CloudDetect issues in your GitHub, Azure DevOps Services, Bitbucket Cloud, GitLab repositories

        © 2025 SonarSource Sàrl. All rights reserved.

        Privacy Policy | Cookie Policy | Terms of Use