You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+28-30Lines changed: 28 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,41 +24,39 @@ _Ensuring the security of application source code is a critical step in modern s
24
24
TBD-step-1-notes.
25
25
-->
26
26
27
-
## Welcome
27
+
## Step 1: Enable CodeQL
28
28
29
-
_Welcome to "Introduction to CodeQL"! :wave:_
29
+
👋 Hello! Welcome to the GitHub Skills course: Enable code scanning!
30
30
31
-
In this course, we will explore using GitHub code scanning, powered by [CodeQL](https://codeql.github.com/), to identify common coding practices that can lead to security vulnerabilities. During this course, we will enable code scanning on your repository to identify, remediate, and prevent vulnerabilities.
31
+
Let's get started!
32
+
33
+
In this first step, we'll be learning more about CodeQL and how to use it to secure your source code.
34
+
35
+
**What is GitHub code scanning**: _[Code scanning](https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning)_ is a capability that allows development teams to integrate security testing tools into the software development process. This is done using GitHub Actions. With code scanning, you can integrate many different types of tools including SAST, container, and infrastructure as code security tools.
36
+
37
+
**What is CodeQL**: _[CodeQL](https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning-with-codeql)_ is a static analysis testing tool that helps you identify security weaknesses such as SQL injection, cross-site scripting, and code injection issues.
38
+
39
+
### :keyboard: Activity: Enable code scanning with CodeQL
32
40
33
-
Code scanning is part of the [GitHub Advanced Security (GHAS)](https://docs.github.com/en/get-started/learning-about-github/about-github-advanced-security) product suite. All of the features of Advanced Security are 100% free for open source, public repositories.
34
-
35
-
-**Who is this for**: Developers, security engineers, open source maintainers.
36
-
-**What you'll learn**: We'll show you how to enable code scanning and identify SQL injection vulnerabilities with CodeQL.
37
-
-**What you'll build**: A secure software development pipeline that allows you to identify and prevent new security vulnerabilities from being introduced into your production code.
38
-
-**Prerequisites**: In this course, you'll need a baseline knowledge of GitHub concepts such as pull requests, GitHub Actions, and source code. You'll also need to be familiar with the concepts of Static Application Security Testing (SAST). Don't worry, we'll demistify the complex parts for you 🙂.
39
-
-**How long**: This course is four steps long and takes less than 30 minutes to complete.
40
-
41
-
## How to start this course
42
-
43
-
<!-- For start course, run in JavaScript:
44
-
'https://github.com/new?' + new URLSearchParams({
45
-
template_owner: 'TBD-organization',
46
-
template_name: 'TBD-course-name',
47
-
owner: '@me',
48
-
name: 'TBD-organization-TBD-course-name',
49
-
description: 'My clone repository',
50
-
visibility: 'public',
51
-
}).toString()
52
-
-->
41
+
First, we will enable code scanning with CodeQL in our repository.
1. Right-click **Start course** and open the link in a new tab.
57
-
2. In the new tab, most of the prompts will automatically fill in for you.
58
-
- For owner, choose your personal account or an organization to host the repository.
59
-
- We recommend creating a public repository, as private repositories will [use Actions minutes](https://docs.github.com/en/billing/managing-billing-for-github-actions/about-billing-for-github-actions).
60
-
- Scroll down and click the **Create repository** button at the bottom of the form.
61
-
3. After your new repository is created, wait about 20 seconds, then refresh the page. Follow the step-by-step instructions in the new repository's README.
50
+
Let's take a look at the configuration options in the modal:
51
+
52
+
-**Languages to analyze:** These are the languages that will be scanned by CodeQL. In this case, we will be scanning in `Python`.
53
+
-**Query suites:** CodeQL [queries](https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning-with-codeql#about-codeql-queries) are packaged in bundles called "suites". This section allows you to choose which query suite to use. We'll leave this set as **Default** for this exercise. For more information, see "[About CodeQL queries](https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning-with-codeql#about-codeql-queries)."
54
+
-**Events:** This section tells CodeQL when to scan. In this case, it's set to scan on any pull request to the `main` branch.
7. Wait about 20 seconds then refresh this page (the one you're following instructions from). [GitHub Actions](https://docs.github.com/en/actions) will automatically update to the next step.
0 commit comments