This directory contains configuration files for GitHub Actions workflows and code scanning features.
Automated continuous integration workflow that builds and tests the AI Art Revenue Exchange platform on every push and pull request.
Jobs:
- Backend Build & Test: Installs dependencies, generates Prisma client, lints, builds, and tests the NestJS backend
- Frontend Build & Test: Installs dependencies, lints, type-checks, and builds the Next.js frontend
- Docker Build: Verifies Docker images can be built for both backend and frontend
Triggers:
- Push to
mainordevelopbranches - Pull requests to
mainordevelopbranches - Manual workflow dispatch
- CodeQL Security Analysis (
workflows/codeql-analysis.yml): GitHub's built-in security vulnerability scanning- Note: Uses advanced configuration. See CODEQL_SETUP.md if experiencing setup issues.
Note: The CodeQL workflow has been upgraded to use github/codeql-action@v4 (February 2026). Version 3 will be deprecated in December 2026. The v4 action provides improved performance, enhanced security analysis, and runs on Node.js 24.
The codeql-config.yml file provides custom configuration for CodeQL security scanning of the AI Art Revenue Exchange platform.
- Query Suites: Enables
security-extendedandsecurity-and-qualitysuites for comprehensive coverage - Scan Paths: Focuses on source code directories (
frontend/src,backend/src,backend/prisma) - Exclusions: Skips scanning of dependencies, build artifacts, and test files
- Languages: Automatically detects JavaScript and TypeScript
If your repository uses GitHub's dynamic code scanning workflow, you can reference this configuration by:
- Navigate to your repository's Security settings
- Go to "Code security and analysis"
- Under "Code scanning", configure the CodeQL analysis
- Reference this configuration file:
.github/codeql-config.yml
If you're using a custom workflow file (.github/workflows/codeql-analysis.yml), add the following to your init step:
- name: Initialize CodeQL
uses: github/codeql-action/init@v4
with:
languages: javascript-typescript
config-file: ./.github/codeql-config.ymlIncluded Paths:
frontend/src- Next.js frontend source codebackend/src- NestJS backend source codebackend/prisma- Database schema and configurations
Excluded Paths:
- Node modules and dependencies
- Build outputs (
dist,build,.next) - Test files and directories
- Documentation and legal files
- Third-party resources
Query Suites:
security-extended- Extended security queries for deeper analysissecurity-and-quality- Combined security and code quality checks
To customize the CodeQL configuration for your specific needs:
- Edit
.github/codeql-config.yml - Add or remove paths as needed
- Enable/disable specific queries using
query-filters - Add custom query packs if you have organization-specific queries
- Keep exclusions up-to-date: Ensure build artifacts and dependencies are excluded
- Review results regularly: Check CodeQL scan results and adjust query filters for false positives
- Use security-extended: Provides the most comprehensive security coverage
- Test configuration changes: Verify that configuration changes work as expected
For more information about CodeQL configuration:
For issues related to code scanning configuration:
- Review the Security Policy
- Check CodeQL workflow logs in the Actions tab
- Contact the security team: security@aiartexchange.com