diff --git a/cmd/mytoken-server/mytoken-setup/setup.go b/cmd/mytoken-server/mytoken-setup/setup.go
index 3a32442585335c61b0266f06c989d740c481153f..dfbe26b0e42fb9644889a448452a064d3971b9f9 100644
--- a/cmd/mytoken-server/mytoken-setup/setup.go
+++ b/cmd/mytoken-server/mytoken-setup/setup.go
@@ -101,7 +101,7 @@ func (c *commandGenSigningKey) Execute(args []string) error {
 // Execute implements the flags.Commander interface
 func (c *commandCreateDB) Execute(args []string) error {
 	password := ""
-	if c.Password != nil && len(*c.Password) == 0 { // -p specified without argument
+	if c.Password != nil && *c.Password == "" { // -p specified without argument
 		password = prompter.Password("Database Password")
 	}
 	db := cluster.NewFromConfig(config.DBConf{
diff --git a/internal/config/config.go b/internal/config/config.go
index de28cc9a16bd18518c08cb5fe54f3f9e44e53cc8..4d13ae01d8fe709ef53361d3d0ae05b31a579a43 100644
--- a/internal/config/config.go
+++ b/internal/config/config.go
@@ -215,7 +215,7 @@ func validate() error {
 		iss0, iss1 := issuerUtils.GetIssuerWithAndWithoutSlash(p.Issuer)
 		conf.ProviderByIssuer[iss0] = p
 		conf.ProviderByIssuer[iss1] = p
-		if len(p.AudienceRequestParameter) == 0 {
+		if p.AudienceRequestParameter == "" {
 			p.AudienceRequestParameter = "resource"
 		}
 	}
diff --git a/internal/db/db.go b/internal/db/db.go
index a7b0355f670dcced3a40307bc8dac4a6e384335f..7ad3a26d447b4e086d9e9580e9f9eb4eec94d8ad 100644
--- a/internal/db/db.go
+++ b/internal/db/db.go
@@ -31,7 +31,7 @@ func Connect() {
 
 // NewNullString creates a new sql.NullString from the given string
 func NewNullString(s string) sql.NullString {
-	if len(s) == 0 {
+	if s == "" {
 		return sql.NullString{}
 	}
 	return sql.NullString{
diff --git a/internal/db/dbrepo/authcodeinforepo/state/state.go b/internal/db/dbrepo/authcodeinforepo/state/state.go
index ee61d96bf640363d5feba7de636957eecad9386c..32829525fe9df16de9bce51c18daffa4d2fd312e 100644
--- a/internal/db/dbrepo/authcodeinforepo/state/state.go
+++ b/internal/db/dbrepo/authcodeinforepo/state/state.go
@@ -24,14 +24,14 @@ func NewState(state string) *State {
 }
 
 func (s *State) Hash() string {
-	if len(s.hash) == 0 {
+	if s.hash == "" {
 		s.hash = hashUtils.SHA512Str([]byte(s.state))
 	}
 	return s.hash
 }
 
 func (s *State) PollingCode() string {
-	if len(s.pollingCode) == 0 {
+	if s.pollingCode == "" {
 		s.pollingCode = hashUtils.HMACSHA512Str([]byte(s.state), []byte("polling_code"))[:config.Get().Features.Polling.Len]
 		log.WithField("state", s.state).WithField("polling_code", s.pollingCode).Debug("Created polling_code for state")
 	}
diff --git a/internal/db/dbrepo/supertokenrepo/transfercoderepo/pollingCodeTmpST.go b/internal/db/dbrepo/supertokenrepo/transfercoderepo/pollingCodeTmpST.go
index a418ac00f41a6bbab278ef2ef5eb7d0fdb275e18..37ff55c2d8b393e73af40177a505d6bc204bc21d 100644
--- a/internal/db/dbrepo/supertokenrepo/transfercoderepo/pollingCodeTmpST.go
+++ b/internal/db/dbrepo/supertokenrepo/transfercoderepo/pollingCodeTmpST.go
@@ -45,7 +45,7 @@ func PopTokenForTransferCode(tx *sqlx.Tx, pollingCode string) (jwt string, err e
 		if err != nil {
 			return err
 		}
-		if !valid || len(jwt) == 0 {
+		if !valid || jwt == "" {
 			return nil
 		}
 		return pt.Delete(tx)
diff --git a/internal/db/dbrepo/supertokenrepo/transfercoderepo/proxytoken.go b/internal/db/dbrepo/supertokenrepo/transfercoderepo/proxytoken.go
index c00765c43a8e1870d4eb4550b0e75218906ced55..c7ebf69c66092f62e0201ce50c047f7b8b6d91d5 100644
--- a/internal/db/dbrepo/supertokenrepo/transfercoderepo/proxytoken.go
+++ b/internal/db/dbrepo/supertokenrepo/transfercoderepo/proxytoken.go
@@ -58,7 +58,7 @@ func (pt proxyToken) Token() string {
 
 // ID returns the id of this token
 func (pt *proxyToken) ID() string {
-	if len(pt.id) == 0 {
+	if pt.id == "" {
 		pt.id = hashUtils.SHA512Str([]byte(pt.token))
 	}
 	return pt.id
@@ -78,7 +78,7 @@ func (pt *proxyToken) JWT(tx *sqlx.Tx) (jwt string, valid bool, err error) {
 		valid = true
 		return
 	}
-	if len(pt.encryptedJWT) == 0 {
+	if pt.encryptedJWT == "" {
 		if err = db.RunWithinTransaction(tx, func(tx *sqlx.Tx) error {
 			return tx.Get(&pt.encryptedJWT, `SELECT jwt FROM ProxyTokens WHERE id=?`, pt.id)
 		}); err != nil {
@@ -90,7 +90,7 @@ func (pt *proxyToken) JWT(tx *sqlx.Tx) (jwt string, valid bool, err error) {
 		}
 	}
 	valid = true
-	if len(pt.encryptedJWT) == 0 {
+	if pt.encryptedJWT == "" {
 		return
 	}
 	jwt, err = cryptUtils.AES256Decrypt(pt.encryptedJWT, pt.token)
diff --git a/internal/endpoints/revocation/revocationEndpoint.go b/internal/endpoints/revocation/revocationEndpoint.go
index 8dfa0dfba762334b9dead6449f189cea6dea590d..66bc25aef51e5ac098b8d762f7bce43dd9b4850f 100644
--- a/internal/endpoints/revocation/revocationEndpoint.go
+++ b/internal/endpoints/revocation/revocationEndpoint.go
@@ -30,7 +30,7 @@ func HandleRevoke(ctx *fiber.Ctx) error {
 	}
 	log.Trace("Parsed super token request")
 	clearCookie := false
-	if len(req.Token) == 0 {
+	if req.Token == "" {
 		req.Token = ctx.Cookies("mytoken-supertoken")
 		clearCookie = true
 	}
diff --git a/internal/endpoints/token/access/accessTokenEndpoint.go b/internal/endpoints/token/access/accessTokenEndpoint.go
index 8badfdf9d39cc521433de9f7701b2060543f10ec..b6d8a5896b059d2c7edb9bc785235adff5c4f1fd 100644
--- a/internal/endpoints/token/access/accessTokenEndpoint.go
+++ b/internal/endpoints/token/access/accessTokenEndpoint.go
@@ -91,7 +91,7 @@ func HandleAccessTokenEndpoint(ctx *fiber.Ctx) error {
 		return res.Send(ctx)
 	}
 	log.Trace("Checked super token capabilities")
-	if len(req.Issuer) == 0 {
+	if req.Issuer == "" {
 		req.Issuer = st.OIDCIssuer
 	} else if req.Issuer != st.OIDCIssuer {
 		res := serverModel.Response{
@@ -131,7 +131,7 @@ func handleAccessTokenRefresh(st *supertoken.SuperToken, req request.AccessToken
 		} else if len(usedRestriction.Scope) > 0 {
 			scopes = usedRestriction.Scope
 		}
-		if len(req.Audience) != 0 {
+		if req.Audience != "" {
 			auds = req.Audience
 		} else if len(usedRestriction.Audiences) > 0 {
 			auds = strings.Join(usedRestriction.Audiences, " ")
diff --git a/internal/endpoints/token/super/transferEndpoint.go b/internal/endpoints/token/super/transferEndpoint.go
index 5d44b62cd789c041c4685d4f7fd98336079af809..13f3aaf6173426a631848a0ad50af2e8a105fb12 100644
--- a/internal/endpoints/token/super/transferEndpoint.go
+++ b/internal/endpoints/token/super/transferEndpoint.go
@@ -18,7 +18,7 @@ import (
 // HandleCreateTransferCodeForExistingSuperToken handles request to create a transfer code for an existing supertoken
 func HandleCreateTransferCodeForExistingSuperToken(ctx *fiber.Ctx) error {
 	token := ctxUtils.GetAuthHeaderToken(ctx)
-	if len(token) == 0 {
+	if token == "" {
 		var req pkg.CreateTransferCodeRequest
 		if err := json.Unmarshal(ctx.Body(), &req); err != nil {
 			return model.Response{
@@ -27,7 +27,7 @@ func HandleCreateTransferCodeForExistingSuperToken(ctx *fiber.Ctx) error {
 			}.Send(ctx)
 		}
 		token = req.SuperToken
-		if len(token) == 0 {
+		if token == "" {
 			return model.Response{
 				Status:   fiber.StatusUnauthorized,
 				Response: pkgModel.BadRequestError("required parameter 'super_token' missing"),
diff --git a/internal/oidc/revoke/revoke.go b/internal/oidc/revoke/revoke.go
index 898ecc26fc1074e488710526987833e34659d961..21566ad5c771a05ee5ed652ebb924638915e364b 100644
--- a/internal/oidc/revoke/revoke.go
+++ b/internal/oidc/revoke/revoke.go
@@ -10,7 +10,7 @@ import (
 
 // RefreshToken revokes a refresh token
 func RefreshToken(provider *config.ProviderConf, rt string) *model.Response {
-	if len(provider.Endpoints.Revocation) == 0 {
+	if provider.Endpoints.Revocation == "" {
 		return nil
 	}
 	req := oidcReqRes.NewRTRevokeRequest(rt)
diff --git a/internal/utils/ctxUtils/token.go b/internal/utils/ctxUtils/token.go
index 0667d466ece6a269c56bd4f9432e93528902e914..6f27cd4043ed4f12023f9941c0bd96b4f95cd110 100644
--- a/internal/utils/ctxUtils/token.go
+++ b/internal/utils/ctxUtils/token.go
@@ -29,7 +29,7 @@ func GetSuperTokenStr(ctx *fiber.Ctx) string {
 // GetSuperToken checks a fiber.Ctx for a super token and returns a token object
 func GetSuperToken(ctx *fiber.Ctx) *token.Token {
 	tok := GetSuperTokenStr(ctx)
-	if len(tok) == 0 {
+	if tok == "" {
 		return nil
 	}
 	t, err := token.GetLongSuperToken(tok)
diff --git a/shared/supertoken/pkg/stid/stid.go b/shared/supertoken/pkg/stid/stid.go
index af639c369a183664446a477360aeea6bd8a6e63e..2e094ea0277d218c1814876c0c78e91e115e1f16 100644
--- a/shared/supertoken/pkg/stid/stid.go
+++ b/shared/supertoken/pkg/stid/stid.go
@@ -38,7 +38,7 @@ func (i *STID) HashValid() bool {
 }
 
 func (i *STID) Hash() string {
-	if len(i.hash) == 0 && i.Valid() {
+	if i.hash == "" && i.Valid() {
 		i.hash = hashUtils.SHA512Str(i.Bytes())
 	}
 	return i.hash
diff --git a/shared/supertoken/pkg/supertoken.go b/shared/supertoken/pkg/supertoken.go
index 2f9cb691fefa2a2cce68ab2d0158881b34840655..5ed3d7223499477f3d0f3a456750db284835ddb2 100644
--- a/shared/supertoken/pkg/supertoken.go
+++ b/shared/supertoken/pkg/supertoken.go
@@ -44,7 +44,7 @@ func (st *SuperToken) verifyID() bool {
 }
 
 func (st *SuperToken) verifySubject() bool {
-	if len(st.Subject) == 0 {
+	if st.Subject == "" {
 		return false
 	}
 	if st.Subject != issuerUtils.CombineSubIss(st.OIDCSubject, st.OIDCIssuer) {
@@ -186,7 +186,7 @@ func CreateTransferCode(stid stid.STID, jwt string, newST bool, responseType mod
 
 // ToTokenResponse creates a SuperTokenResponse for this SuperToken according to the passed model.ResponseType
 func (st *SuperToken) ToTokenResponse(responseType model.ResponseType, networkData serverModel.ClientMetaData, jwt string) (response.SuperTokenResponse, error) {
-	if len(jwt) == 0 {
+	if jwt == "" {
 		jwt = st.jwt
 	}
 	switch responseType {
diff --git a/shared/supertoken/restrictions/restriction.go b/shared/supertoken/restrictions/restriction.go
index 1180ed1ff92248f38cbc572331134a88c8f67f41..84da56de40c6b455d01138cc152a25281be2af38 100644
--- a/shared/supertoken/restrictions/restriction.go
+++ b/shared/supertoken/restrictions/restriction.go
@@ -213,7 +213,7 @@ func (r Restrictions) WithScopes(scopes []string) (ret Restrictions) {
 		return r
 	}
 	for _, rr := range r {
-		if len(rr.Scope) == 0 || utils.IsSubSet(scopes, utils.SplitIgnoreEmpty(rr.Scope, " ")) {
+		if rr.Scope == "" || utils.IsSubSet(scopes, utils.SplitIgnoreEmpty(rr.Scope, " ")) {
 			ret = append(ret, rr)
 		}
 	}