Skip to content

Add queries: security-extended to codeql config #58

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 4 commits into from
May 28, 2025
Merged

Conversation

GrantBirki
Copy link
Member

This pull request enables security-extended queries on our CodeQL configurations.

@Copilot Copilot AI review requested due to automatic review settings March 20, 2025 20:17
Copy link

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This pull request enables additional CodeQL security scans by adding the security-extended queries to our configuration.

  • Added the "queries: security-extended" option in the CodeQL workflow.
  • Enhances security scanning capabilities using CodeQL.

Tip: Copilot code review supports C#, Go, Java, JavaScript, Markdown, Python, Ruby and TypeScript, with more languages coming soon. Learn more

@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

Copy link

@boveus boveus left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good - but you should consider deleting this file altogether and using the Default Config. That would allow you to do the same thing without having to maintain this workflow file.

https://github.com/github/entitlements-app/settings/security_analysis

Screenshot 2025-03-20 at 4 43 38 PM

If you want I can turn that on for you.

@GrantBirki
Copy link
Member Author

@boveus I went ahead and deleted the file

@GrantBirki GrantBirki merged commit ff3219d into main May 28, 2025
18 checks passed
@GrantBirki GrantBirki deleted the GrantBirki-patch-1 branch May 28, 2025 15:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants