diff --git a/main_test.go b/main_test.go
index c41c26bd184a9ac5d25e516f7c906a5ad59884e0..d9f9ae3d81e88b14d48de4f3eb6c6165da7f5db9 100644
--- a/main_test.go
+++ b/main_test.go
@@ -12,7 +12,7 @@ import (
 
 /**
 * API - Test to check if the URL intelligence endpoint returns HTTP StatusOK when expected
-*/
+ */
 
 func TestUrlIntelligenceOK(t *testing.T) {
 
@@ -38,14 +38,14 @@ func TestUrlIntelligenceOK(t *testing.T) {
 	}
 	defer res.Body.Close()
 
-	if res.StatusCode != 200 {
+	if res.StatusCode != http.StatusOK {
 		t.Fatalf("Test failed, error code different from expected 200, received: %d", res.StatusCode)
 	}
 }
 
 /**
 * API test to check whether the url-intelligence endpoint will return 401 Unauthorized when attempting to be accessed without log in.
-*/
+ */
 
 func TestUrlIntelligenceUnauthorized(t *testing.T) {
 
@@ -66,16 +66,15 @@ func TestUrlIntelligenceUnauthorized(t *testing.T) {
 	}
 	defer res.Body.Close()
 
-	if res.StatusCode != 401 {
+	if res.StatusCode != http.StatusUnauthorized {
 		t.Fatalf("Test failed, error code different from expected 401, received: %d", res.StatusCode)
 	}
 }
 
-
 /**
 * API - Test to check if the hash intelligence endpoint returns HTTP StatusOK when expected
-*/
-func TestHashIntelligenceOK(t *testing.T){
+ */
+func TestHashIntelligenceOK(t *testing.T) {
 
 	content, err := ioutil.ReadFile("testauth.txt")
 	if err != nil {
@@ -99,15 +98,15 @@ func TestHashIntelligenceOK(t *testing.T){
 	}
 	defer res.Body.Close()
 
-	if res.StatusCode != 200 {
-		t.Fatalf("Test failed, error code different from expected 200, received: %d", res.StatusCode)
+	if res.StatusCode != http.StatusOK {
+		t.Fatalf("Test failed, status code different from expected 200, received: %d", res.StatusCode)
 	}
 }
 
 /**
 * API test to check whether the hash-intelligence endpoint will return 401 Unauthorized when attempting to be accessed without log in.
-*/
-func TestHashIntelligenceUnauthorized(t *testing.T){
+ */
+func TestHashIntelligenceUnauthorized(t *testing.T) {
 	auth := "ThisShouldNotWork"
 	url := "http://localhost:8081/hash-intelligence?hash=a7a665a695ec3c0f862a0d762ad55aff6ce6014359647e7c7f7e3c4dc3be81b7&userAuth=" + auth
 
@@ -125,8 +124,8 @@ func TestHashIntelligenceUnauthorized(t *testing.T){
 	}
 	defer res.Body.Close()
 
-	if res.StatusCode != 401 {
-		t.Fatalf("Test failed, error code different from expected 401, received: %d", res.StatusCode)
+	if res.StatusCode != http.StatusUnauthorized {
+		t.Fatalf("Test failed, status code different from expected 401, received: %d", res.StatusCode)
 	}
 }
 
@@ -141,7 +140,7 @@ func TestHashIntelligenceUnauthorized(t *testing.T){
 * If there is a screenshot of the requested URL
 * If status or content is not set in any of the responses from the intelligence sources
 *
-*/
+ */
 func TestUrlIntelligenceValidOutput(t *testing.T) {
 
 	content, err := ioutil.ReadFile("testauth.txt")
@@ -166,11 +165,10 @@ func TestUrlIntelligenceValidOutput(t *testing.T) {
 	}
 	defer res.Body.Close()
 
-	if res.StatusCode != 200 {
-		t.Fatalf("Test failed, error code different from expected 200, received: %d", res.StatusCode)
+	if res.StatusCode != http.StatusOK {
+		t.Fatalf("Test failed, status code different from expected 200, received: %d", res.StatusCode)
 	}
 
-
 	body, err := ioutil.ReadAll(res.Body)
 	if err != nil {
 		t.Fatalf("Error: reading api response")
@@ -191,7 +189,7 @@ func TestUrlIntelligenceValidOutput(t *testing.T) {
 		t.Fatalf("Error in screenshot")
 	}
 
-	for i := 0; i<=3; i++{ 
+	for i := 0; i <= 3; i++ {
 		if jsonResponse.FrontendResponse[i].EN.Status == "" {
 			t.Fatalf("One status or more statuses are not set in english. Sourcename: %s , content is empty", jsonResponse.FrontendResponse[i].SourceName)
 		}
@@ -200,10 +198,10 @@ func TestUrlIntelligenceValidOutput(t *testing.T) {
 		}
 	}
 
-	for i := 0; i<=3; i++{ 
+	for i := 0; i <= 3; i++ {
 		if jsonResponse.FrontendResponse[i].EN.Content == "" {
 			t.Fatalf("One content or more contents are not set in english. Sourcename: %s , content is empty", jsonResponse.FrontendResponse[i].SourceName)
-			
+
 		}
 		if jsonResponse.FrontendResponse[i].NO.Content == "" {
 			t.Fatalf("One status or more contents are not set in norwegian. Sourcename: %s is not set.", jsonResponse.FrontendResponse[i].SourceName)
@@ -222,7 +220,7 @@ func TestUrlIntelligenceValidOutput(t *testing.T) {
 * If the first and second sourceName is "Hybrid Analysis and AlienVault" respectively, as expected
 * If status or content is not set in any of the responses from the intelligence sources both in english and norwegian.
 * If the status of AlienVault is risk as expected.
-*/
+ */
 func TestHash_IntelligenceValidOutput(t *testing.T) {
 
 	content, err := ioutil.ReadFile("testauth.txt")
@@ -251,7 +249,6 @@ func TestHash_IntelligenceValidOutput(t *testing.T) {
 		t.Fatalf("Test failed, error code different from expected 200, received: %d", res.StatusCode)
 	}
 
-
 	body, err := ioutil.ReadAll(res.Body)
 	if err != nil {
 		t.Fatalf("Error: reading api response")
@@ -268,11 +265,11 @@ func TestHash_IntelligenceValidOutput(t *testing.T) {
 		t.Fatalf("The first sourcename is not expected Google Safebrowsing API, output: %s", jsonResponse.FrontendResponse[0].SourceName)
 	}
 
-	if jsonResponse.FrontendResponse[1].SourceName != "AlienVault"{
+	if jsonResponse.FrontendResponse[1].SourceName != "AlienVault" {
 		t.Fatalf("Unexpected sourcename expected AlienVault, reality: %s", jsonResponse.FrontendResponse[1].SourceName)
 	}
 
-	for i := 0; i<=1; i++{ 
+	for i := 0; i <= 1; i++ {
 		if jsonResponse.FrontendResponse[i].EN.Status == "" {
 			t.Fatalf("One status or more statuses are not set in english, Sourcename: %s is not set.", jsonResponse.FrontendResponse[i].SourceName)
 		}
@@ -281,7 +278,7 @@ func TestHash_IntelligenceValidOutput(t *testing.T) {
 		}
 	}
 
-	for i := 0; i<=1; i++{ 
+	for i := 0; i <= 1; i++ {
 		if jsonResponse.FrontendResponse[i].EN.Content == "" {
 			t.Fatalf("One status or more contents are not set in english, Sourcename: %s is not set.", jsonResponse.FrontendResponse[i].SourceName)
 		}
@@ -290,17 +287,17 @@ func TestHash_IntelligenceValidOutput(t *testing.T) {
 		}
 	}
 
-	if jsonResponse.FrontendResponse[1].EN.Status != "Risk"{
+	if jsonResponse.FrontendResponse[1].EN.Status != "Risk" {
 		t.Fatalf("The status of AlienVault has is not as expected Risk, Status is: %s", jsonResponse.FrontendResponse[1].EN.Status)
 	}
 }
 
 /**
-* This API test checks if an unspecified endpoint in the API returns 404 as expected 
+* This API test checks if an unspecified endpoint in the API returns 404 as expected
 *
-*/
+ */
 
-func TestNotSpecifiedEndpoint(t *testing.T){
+func TestNotSpecifiedEndpoint(t *testing.T) {
 
 	url := "http://localhost:8081/ThisShouldNotExist"
 
@@ -321,4 +318,4 @@ func TestNotSpecifiedEndpoint(t *testing.T){
 	if res.StatusCode != http.StatusNotFound {
 		t.Fatalf("Staus code did not return 404 as expected, code returned %d", res.StatusCode)
 	}
-}
\ No newline at end of file
+}