You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- add queries that explicitly target local sources from OSS pack (pulls in built in queries)
- publish a config that explicitly targets local sources where possible (without pulling in lower precision queries)
- audit pack is working better now due to fixGitHubSecurityLab/CodeQL-Community-Packs#35
Copy file name to clipboardExpand all lines: config/codeql-audit.yml
+2-3Lines changed: 2 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,3 @@
1
-
# TODO: WORK IN PROGRESS: https://github.com/GitHubSecurityLab/CodeQL-Community-Packs/pull/35
2
1
# Use this configuration file when looking to audit the codebase for security risks.
3
2
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
4
3
@@ -11,7 +10,7 @@ threat-models: local
11
10
disable-default-queries: true
12
11
13
12
packs:
14
-
# OSS audit queries from the default suites for the GitHub Security Lab's Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
13
+
# OSS audit queries from the default suites for the GitHub Security Lab's Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
# Use this configuration file when looking to expand the sources of vulnerability data using CodeQL Built in queries,custom queries, and data extensions.
2
+
# A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3
+
name: "Synthetic Apps All Queries Config"
4
+
5
+
# expand thread model - https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#extending-codeql-coverage-with-threat-models
# Data extensions via Community Packs for libraries (library ext models are those generated by the corresponding queries in src) https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
23
+
- githubsecuritylab/codeql-csharp-library-sources
24
+
- githubsecuritylab/codeql-java-library-sources
25
+
26
+
# Data extensions via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
Copy file name to clipboardExpand all lines: config/codeql-synthetics.yml
+65-62Lines changed: 65 additions & 62 deletions
Original file line number
Diff line number
Diff line change
@@ -10,34 +10,38 @@ threat-models: local
10
10
# start from scratch - https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#disabling-the-default-queries
11
11
disable-default-queries: true
12
12
13
-
packs:
14
-
# All queries from the CodeQL Built in packs
15
-
- codeql/cpp-queries:.
16
-
- codeql/csharp-queries:.
17
-
- codeql/go-queries:.
13
+
packs:
14
+
# All queries from the CodeQL Built in packs (including low/no precision queries)
15
+
- codeql/cpp-queries:.
16
+
- codeql/csharp-queries:.
17
+
- codeql/go-queries:.
18
18
- codeql/java-queries:.
19
19
- codeql/javascript-queries:.
20
20
- codeql/python-queries:.
21
21
- codeql/ruby-queries:.
22
22
- codeql/swift-queries:.
23
23
24
24
# OSS queries from the default suites
25
-
25
+
26
26
### GitHub Security Lab###
27
27
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
28
28
- githubsecuritylab/codeql-cpp-queries
29
29
- githubsecuritylab/codeql-csharp-queries
30
30
- githubsecuritylab/codeql-go-queries
31
31
- githubsecuritylab/codeql-java-queries
32
-
- githubsecuritylab/codeql-javascript-queries
32
+
- githubsecuritylab/codeql-javascript-queries
33
33
- githubsecuritylab/codeql-python-queries
34
-
- githubsecuritylab/codeql-ruby-queries
34
+
- githubsecuritylab/codeql-ruby-queries
35
+
36
+
# Queries via Community Packs that use local sources https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
# Data extensions for libraries (library ext models are those generated by the corresponding queries in src) from the GitHub Security Lab https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
40
+
# Data extensions via Community Packs for libraries (library ext models are those generated by the corresponding queries in src) https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
37
41
- githubsecuritylab/codeql-csharp-library-sources
38
42
- githubsecuritylab/codeql-java-library-sources
39
43
40
-
# Data extensions from the GitHub Security Lab https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
44
+
# Data extensions via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
41
45
- githubsecuritylab/codeql-csharp-extensions
42
46
- githubsecuritylab/codeql-java-extensions
43
47
@@ -52,60 +56,59 @@ packs:
52
56
# - restriction of no experimental folder
53
57
# - restriction of audit/debugging queries from community packs
54
58
query-filters:
55
-
- include:
56
-
kind:
57
-
- problem
58
-
- path-problem
59
-
tags contain:
60
-
- security
61
-
- include:
62
-
kind:
63
-
- diagnostic
64
-
- include:
65
-
kind:
66
-
- metric
67
-
tags contain:
68
-
- summary
69
-
- exclude:
70
-
deprecated: //
71
-
- exclude:
72
-
query path:
73
-
# REMOVE exclude - OK even if they exist in experimental folder
74
-
#- /^experimental\/.*/
75
-
- Metrics/Summaries/FrameworkCoverage.ql
76
-
- /Diagnostics/Internal/.*/
77
-
- exclude:
78
-
tags contain:
79
-
- modeleditor
80
-
- modelgenerator
81
-
# Exclude audit queries from the CodeQL Built in packs
82
-
- exclude:
83
-
id:
84
-
- cpp/untrusted-data-to-external-api
85
-
- cs/untrusted-data-to-external-api
86
-
- go/untrusted-data-to-external-api
87
-
- java/untrusted-data-to-external-api
88
-
- js/untrusted-data-to-external-api
89
-
- py/untrusted-data-to-external-api
90
-
59
+
- include:
60
+
kind:
61
+
- problem
62
+
- path-problem
63
+
tags contain:
64
+
- security
65
+
- include:
66
+
kind:
67
+
- diagnostic
68
+
- include:
69
+
kind:
70
+
- metric
71
+
tags contain:
72
+
- summary
73
+
- exclude:
74
+
deprecated: //
75
+
- exclude:
76
+
query path:
77
+
# REMOVE exclude - OK even if they exist in experimental folder
78
+
#- /^experimental\/.*/
79
+
- Metrics/Summaries/FrameworkCoverage.ql
80
+
- /Diagnostics/Internal/.*/
81
+
- exclude:
82
+
tags contain:
83
+
- modeleditor
84
+
- modelgenerator
85
+
# Exclude audit queries from the CodeQL Built in packs
86
+
- exclude:
87
+
id:
88
+
- cpp/untrusted-data-to-external-api
89
+
- cs/untrusted-data-to-external-api
90
+
- go/untrusted-data-to-external-api
91
+
- java/untrusted-data-to-external-api
92
+
- js/untrusted-data-to-external-api
93
+
- py/untrusted-data-to-external-api
91
94
92
-
# Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs)
93
-
- exclude:
94
-
tags contain:
95
-
- debugging
96
-
- audit
95
+
# Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs)
0 commit comments