You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Use this query suite when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs.
2
+
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3
+
# NOTE: This suite will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers.
4
+
# NOTE: A suite cannot exclude directories from the scan. Consider pairing with a codeql-config.yml that excludes unwanted folders with `paths-ignore`
5
+
# NOTE: A suite cannot include library packs that contain data extensions. Consider pairing with a codeql-config.yml that includes needed data models.
6
+
7
+
# Run the following pack install commands to prime your workspace or run the analyze command using `--download` flag
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
20
+
- qlpack: githubsecuritylab/codeql-cpp-queries
21
+
22
+
### Trail of Bits ###
23
+
# Queries via packs: https://github.com/trailofbits/codeql-queries (default suites include security + crypto)
24
+
- qlpack: trailofbits/cpp-queries
25
+
26
+
- include:
27
+
kind:
28
+
- problem
29
+
- path-problem
30
+
tags contain:
31
+
- security
32
+
- include:
33
+
kind:
34
+
- diagnostic
35
+
- include:
36
+
kind:
37
+
- metric
38
+
tags contain:
39
+
- summary
40
+
- exclude:
41
+
deprecated: //
42
+
- exclude:
43
+
query path:
44
+
# REMOVE exclude - OK even if they exist in experimental folder
45
+
#- /^experimental\/.*/
46
+
- Metrics/Summaries/FrameworkCoverage.ql
47
+
- /Diagnostics/Internal/.*/
48
+
- exclude:
49
+
tags contain:
50
+
- modeleditor
51
+
- modelgenerator
52
+
# Exclude audit queries from the CodeQL Built in packs
53
+
- exclude:
54
+
id:
55
+
- cpp/untrusted-data-to-external-api
56
+
# Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs)
# Use this query suite when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs.
2
+
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3
+
# NOTE: This suite will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers.
4
+
# NOTE: A suite cannot exclude directories from the scan. Consider pairing with a codeql-config.yml that excludes unwanted folders with `paths-ignore`
5
+
# NOTE: A suite cannot include library packs that contain data extensions. Consider pairing with a codeql-config.yml that includes needed data models.
6
+
7
+
# Run the following pack install commands to prime your workspace or run the analyze command using `--download` flag
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
19
+
- qlpack: githubsecuritylab/codeql-csharp-queries
20
+
21
+
22
+
- include:
23
+
kind:
24
+
- problem
25
+
- path-problem
26
+
tags contain:
27
+
- security
28
+
- include:
29
+
kind:
30
+
- diagnostic
31
+
- include:
32
+
kind:
33
+
- metric
34
+
tags contain:
35
+
- summary
36
+
- exclude:
37
+
deprecated: //
38
+
- exclude:
39
+
query path:
40
+
# REMOVE exclude - OK even if they exist in experimental folder
41
+
#- /^experimental\/.*/
42
+
- Metrics/Summaries/FrameworkCoverage.ql
43
+
- /Diagnostics/Internal/.*/
44
+
- exclude:
45
+
tags contain:
46
+
- modeleditor
47
+
- modelgenerator
48
+
# Exclude audit queries from the CodeQL Built in packs
49
+
- exclude:
50
+
id:
51
+
- csharp/untrusted-data-to-external-api
52
+
# Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs)
# Use this query suite when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs.
2
+
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3
+
# NOTE: This suite will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers.
4
+
# NOTE: A suite cannot exclude directories from the scan. Consider pairing with a codeql-config.yml that excludes unwanted folders with `paths-ignore`
5
+
# NOTE: A suite cannot include library packs that contain data extensions. Consider pairing with a codeql-config.yml that includes needed data models.
6
+
7
+
# Run the following pack install commands to prime your workspace or run the analyze command using `--download` flag
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
20
+
- qlpack: githubsecuritylab/codeql-go-queries
21
+
22
+
### Trail of Bits ###
23
+
# Queries via packs: https://github.com/trailofbits/codeql-queries (default suites include security + crypto)
24
+
- qlpack: trailofbits/go-queries
25
+
26
+
- include:
27
+
kind:
28
+
- problem
29
+
- path-problem
30
+
tags contain:
31
+
- security
32
+
- include:
33
+
kind:
34
+
- diagnostic
35
+
- include:
36
+
kind:
37
+
- metric
38
+
tags contain:
39
+
- summary
40
+
- exclude:
41
+
deprecated: //
42
+
- exclude:
43
+
query path:
44
+
# REMOVE exclude - OK even if they exist in experimental folder
45
+
#- /^experimental\/.*/
46
+
- Metrics/Summaries/FrameworkCoverage.ql
47
+
- /Diagnostics/Internal/.*/
48
+
- exclude:
49
+
tags contain:
50
+
- modeleditor
51
+
- modelgenerator
52
+
# Exclude audit queries from the CodeQL Built in packs
53
+
- exclude:
54
+
id:
55
+
- go/untrusted-data-to-external-api
56
+
# Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs)
# Use this query suite when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs.
2
+
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3
+
# NOTE: This suite will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers.
4
+
# NOTE: A suite cannot exclude directories from the scan. Consider pairing with a codeql-config.yml that excludes unwanted folders with `paths-ignore`
5
+
# NOTE: A suite cannot include library packs that contain data extensions. Consider pairing with a codeql-config.yml that includes needed data models.
6
+
7
+
# Run the following pack install commands to prime your workspace or run the analyze command using `--download` flag
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
19
+
- qlpack: githubsecuritylab/codeql-java-queries
20
+
21
+
# Queries via Community Packs that use local sources https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
# Use this query suite when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs.
2
+
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3
+
# NOTE: This suite will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers.
4
+
# NOTE: A suite cannot exclude directories from the scan. Consider pairing with a codeql-config.yml that excludes unwanted folders with `paths-ignore`
5
+
# NOTE: A suite cannot include library packs that contain data extensions. Consider pairing with a codeql-config.yml that includes needed data models.
6
+
7
+
# Run the following pack install commands to prime your workspace or run the analyze command using `--download` flag
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
# Use this query suite when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs.
2
+
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3
+
# NOTE: This suite will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers.
4
+
# NOTE: A suite cannot exclude directories from the scan. Consider pairing with a codeql-config.yml that excludes unwanted folders with `paths-ignore`
5
+
# NOTE: A suite cannot include library packs that contain data extensions. Consider pairing with a codeql-config.yml that includes needed data models.
6
+
7
+
# Run the following pack install commands to prime your workspace or run the analyze command using `--download` flag
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
19
+
- qlpack: githubsecuritylab/codeql-python-queries
20
+
21
+
# Queries via Community Packs that use local sources https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
0 commit comments