-
Notifications
You must be signed in to change notification settings - Fork 2k
Create codeql-analysis.yml #3162
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
# the `language` matrix defined below to confirm you have the correct set of | ||
# supported CodeQL languages. | ||
# | ||
name: "CodeQL" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not sure this belongs in graphql-js
? There's no description on your diff, @IvanGoncharov, and I'm not always hip on the latest open source tooling, so I'm not totally sure how CodeQL's yml file getting added to the graphql-js repo benefits us.
https://securitylab.github.com/tools/codeql/ => it seems like anyone who wants to use CodeQL can, without defaulting everyone who downloads graphql-js
to run it. I may be missing some of the benefits or purpose of CodeQL here, though, or what it's actually doing. Is this essentially just setting up a "code analysis" test, similar to our test coverage tests?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@mjmahone Sorry, I opened this PR through GitHub UI (content is autogenerated), so it wasn't my intention to merge it just to give it a spin.
About why we need it, it is used by various tools to score the security of a particular OSS project, e.g. https://github.com/ossf/scorecard/blob/main/docs/checks.md#sast
Also, it can uncover some real security issues both in our sorce code and GitHub
workflows.
without defaulting everyone who downloads graphql-js to run it.
No, you don't need to install it or run it.
It just runs on CI, so it doesn't affect local workflow.
Motivation: increase security. Discovered while looking into graphql#3162
Motivation: increase security. Discovered while looking into graphql#3162
Motivation: codeql are quite popular now, moreover various projects use it as metric on how secure certain OSS project is. Example: https://github.com/ ossf/scorecard/blob/main/docs/checks.md#sast Also, it can uncover some real security issues both in our sorce code and GitHub workflows. So I don't see a lot of harm by enabling it, we can always ignore certain files or disable it completely. Fixes graphql#3162
Motivation: codeql are quite popular now, moreover various projects use it as metric on how secure certain OSS project is. Example: https://github.com/ ossf/scorecard/blob/main/docs/checks.md#sast Also, it can uncover some real security issues both in our sorce code and GitHub workflows. So I don't see a lot of harm by enabling it, we can always ignore certain files or disable it completely. Fixes graphql#3162
Motivation: codeql are quite popular now, moreover various projects use it as metric on how secure certain OSS project is. Example: https://github.com/ ossf/scorecard/blob/main/docs/checks.md#sast Also, it can uncover some real security issues both in our sorce code and GitHub workflows. So I don't see a lot of harm by enabling it, we can always ignore certain files or disable it completely. Fixes graphql#3162
Motivation: codeql are quite popular now, moreover various projects use it as metric on how secure certain OSS project is. Example: https://github.com/ ossf/scorecard/blob/main/docs/checks.md#sast Also, it can uncover some real security issues both in our sorce code and GitHub workflows. So I don't see a lot of harm by enabling it, we can always ignore certain files or disable it completely. Fixes graphql#3162
Motivation: codeql are quite popular now, moreover various projects use it as metric on how secure certain OSS project is. Example: https://github.com/ ossf/scorecard/blob/main/docs/checks.md#sast Also, it can uncover some real security issues both in our sorce code and GitHub workflows. So I don't see a lot of harm by enabling it, we can always ignore certain files or disable it completely. Fixes graphql#3162
Motivation: codeql are quite popular now, moreover various projects use it as metric on how secure certain OSS project is. Example: https://github.com/ ossf/scorecard/blob/main/docs/checks.md#sast Also, it can uncover some real security issues both in our sorce code and GitHub workflows. So I don't see a lot of harm by enabling it, we can always ignore certain files or disable it completely. Fixes graphql#3162
Motivation: codeql are quite popular now, moreover various projects use it as metric on how secure certain OSS project is. Example: https://github.com/ ossf/scorecard/blob/main/docs/checks.md#sast Also, it can uncover some real security issues both in our sorce code and GitHub workflows. So I don't see a lot of harm by enabling it, we can always ignore certain files or disable it completely. Fixes graphql#3162
Motivation: codeql are quite popular now, moreover various projects use it as metric on how secure certain OSS project is. Example: https://github.com/ ossf/scorecard/blob/main/docs/checks.md#sast Also, it can uncover some real security issues both in our sorce code and GitHub workflows. So I don't see a lot of harm by enabling it, we can always ignore certain files or disable it completely. Fixes graphql#3162
No description provided.