-
Notifications
You must be signed in to change notification settings - Fork 60
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added CodeQL code-scan workflow #67
base: main
Are you sure you want to change the base?
Conversation
…deQL querries: "security-extended" and "security-and-quality".
@lgndluke I don't know if you only gave permissions to the authors of r3 but I can't view any code scan reports. The Security tab says that nothing is published and the links show 404. |
Hey @TechInterMezzo, I did not change any permissions within my fork of r3. I currently assume the fact that you are unable to access the code scanning results / alerts could be due to some sort of GitHub standard (allowing only collaborators of the project to access the results / alerts), or maybe there is an organization level rule implied by the r3-team organization, which manages those kind of access permissions. However, I can't confirm any of this. To verify could you please try to open this code-scanning alert from another project of mine? If it opens, then the r3-team most likely has put some access permissions up. Anyhow, if it doesn't open then I'd assume it's a GitHub standard only allowing collaborators to access a projects code scanning results. @PR-Assignee / Gabriel Best regards, |
I´ve had a look and I have no access either. The links point to your forked repo, so I assume that our repo / organization rules do not apply there. You might need to look at the security settings of your repo: The link from your alternate project also does not work for me. I get a page 404. Maybe its set to private? Regarding CodeQL: I have never worked with it, but I looked at the things it found in the provided screenshots. All examples I´ve looked at where so far unhelpful as the As an example for a This is "bad" because the input that goes into the There are probably a number of flaws that a tool like this can show, which are useful to learn. I will try it out locally to see if it can be configured to help us. But I want to avoid flooding the public repo with unuseful findings. |
I´ve accepted your invitation. I am now able to view the security findings in your forked repo. I will have a look at them now. Since I have no experience with how CodeQL works and how it interacts with repos, I will have to spend some time on it before I can judge if it makes sense for us. Regardless, thank you for the iniative :) |
Hey Gabriel,
I've added a GitHub Actions workflow to the project, which utilizes CodeQL to provide a comprehensive code analysis.
This workflow may be useful for detecting vulnerabilities / programming errors inside the project that might otherwise go unnoticed.
The analysis data of the main branch (and only the data of the main branch, as far as I am aware of) is stored inside the Security section under "Code scanning" inside the GitHub project.
Example: Results listed inside the projects Security section

Link to check out the results of my latest r3 code-scan run: Click here to be redirected
When inspecting an open result it provides detailed information, as well as a recommendation on how to fix/resolve the potential problem.
Example: Code-Scan alert



Link to check out the result that is displayed here: Click here to be redirected
It's also worth noting, that the workflow is capable of automatically closing previous result once they have been fixed.
(Will be updated on the next workflow run!)
Example: Closed Alert

Link to check out the closed alert displayed here: Click here to be redirected
Currently it is set to active whenever a commit to the main branch is made.
However, this behavior could also be changed so that the workflow for example is regularly run as a scheduled cron-job, or for example whenever a pull-request is being merged.
The triggers can also be combined, you can find out more about them here: CodeQL-Documentation
Sidenote: Furthermore, I've also added the ".idea" directory created by my IDE of choice to the .gitignore file.
Best regards,
Lukas Jeckle