ci: add CodeQL analysis#16
Conversation
|
You are seeing this message because GitHub Code Scanning has recently been set up for this repository, or this pull request contains the workflow file for the Code Scanning tool. What Enabling Code Scanning Means:
For more information about GitHub Code Scanning, check out the documentation. |
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: 29314a8a0b
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
| branches: [polish/v1.0-improvements] | ||
| pull_request: | ||
| branches: [polish/v1.0-improvements] |
There was a problem hiding this comment.
Include the main branch in CodeQL triggers
With these branches filters, GitHub only runs the push workflow for pushes to polish/v1.0-improvements and the PR workflow for PRs targeting that same branch; I checked the repo context and the normal branch is main (for example docs/developer/releases.md pushes releases from main, and the local repo has a main branch). As a result, PRs into main and direct pushes to main get no CodeQL analysis, so the added security coverage is skipped for the primary development/release path unless this branch name is changed or main is included.
Useful? React with 👍 / 👎.
What
Why
How
Testing
Performance Impact
Risk / Notes