Skip to content

Commit 675c1a3

Browse files
authored
Create codeql-synthetics.yml
1 parent ffbddb1 commit 675c1a3

File tree

1 file changed

+114
-0
lines changed

1 file changed

+114
-0
lines changed

configs/codeql-synthetics.yml

Lines changed: 114 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,114 @@
1+
# Use this configuration file when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs.
2+
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3+
# NOTE: This configuration will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers.
4+
5+
name: "Synthetic Apps All Queries Config"
6+
7+
# expand thread model - https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#extending-codeql-coverage-with-threat-models
8+
threat-models: local
9+
10+
# start from scratch - https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#disabling-the-default-queries
11+
disable-default-queries: true
12+
13+
packs:
14+
# All queries from the CodeQL Built in packs (including low/no precision queries)
15+
- codeql/cpp-queries:.
16+
- codeql/csharp-queries:.
17+
- codeql/go-queries:.
18+
- codeql/java-queries:.
19+
- codeql/javascript-queries:.
20+
- codeql/python-queries:.
21+
- codeql/ruby-queries:.
22+
- codeql/swift-queries:.
23+
24+
# OSS queries from the default suites
25+
26+
### GitHub Security Lab###
27+
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
28+
- githubsecuritylab/codeql-cpp-queries
29+
- githubsecuritylab/codeql-csharp-queries
30+
- githubsecuritylab/codeql-go-queries
31+
- githubsecuritylab/codeql-java-queries
32+
- githubsecuritylab/codeql-javascript-queries
33+
- githubsecuritylab/codeql-python-queries
34+
- githubsecuritylab/codeql-ruby-queries
35+
36+
# Queries via Community Packs that use local sources https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
37+
- githubsecuritylab/codeql-java-queries:suites/java-local.qls
38+
- githubsecuritylab/codeql-python-queries:suites/python-local.qls
39+
40+
# Data extensions via Community Packs for libraries (library ext models are those generated by the corresponding queries in src) https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
41+
- githubsecuritylab/codeql-csharp-library-sources
42+
- githubsecuritylab/codeql-java-library-sources
43+
44+
# Data extensions via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
45+
- githubsecuritylab/codeql-csharp-extensions
46+
- githubsecuritylab/codeql-java-extensions
47+
48+
### Trail of Bits ###
49+
# Queris via packs: https://github.com/trailofbits/codeql-queries (default suites include security + crypto
50+
- trailofbits/cpp-queries
51+
- trailofbits/go-queries
52+
53+
# Start with Security Experimental (lightly documented: https://github.com/github/codeql/pull/11702) : https://github.com/github/codeql/blob/main/misc/suite-helpers/security-experimental-selectors.yml
54+
# - precision ( low + Low or EXCLUDED precision)
55+
# + problem.severity: recommendation
56+
# - restriction of no experimental folder
57+
# - restriction of audit/debugging queries from community packs
58+
query-filters:
59+
- include:
60+
kind:
61+
- problem
62+
- path-problem
63+
tags contain:
64+
- security
65+
- include:
66+
kind:
67+
- diagnostic
68+
- include:
69+
kind:
70+
- metric
71+
tags contain:
72+
- summary
73+
- exclude:
74+
deprecated: //
75+
- exclude:
76+
query path:
77+
# REMOVE exclude - OK even if they exist in experimental folder
78+
#- /^experimental\/.*/
79+
- Metrics/Summaries/FrameworkCoverage.ql
80+
- /Diagnostics/Internal/.*/
81+
- exclude:
82+
tags contain:
83+
- modeleditor
84+
- modelgenerator
85+
# Exclude audit queries from the CodeQL Built in packs
86+
- exclude:
87+
id:
88+
- cpp/untrusted-data-to-external-api
89+
- cs/untrusted-data-to-external-api
90+
- go/untrusted-data-to-external-api
91+
- java/untrusted-data-to-external-api
92+
- js/untrusted-data-to-external-api
93+
- py/untrusted-data-to-external-api
94+
95+
# Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs)
96+
- exclude:
97+
tags contain:
98+
- debugging
99+
- audit
100+
101+
#Additional extractor excludes: https://github.com/github/codeql/blob/768e5190a1c9d40a4acc7143c461c3b114e7fd59/javascript/extractor/src/com/semmle/js/extractor/AutoBuild.java#L421-L427C42
102+
paths-ignore:
103+
# Python
104+
- "vendor/**"
105+
- "examples/**"
106+
- "tests/**"
107+
108+
# JavaScript
109+
- "node_modules"
110+
- "**/*.test.js"
111+
- "**/*.test.tsx"
112+
- "**/*.spec.ts"
113+
- "**/*.spec.tsx"
114+
- "dist"

0 commit comments

Comments
 (0)