Skip to content
This repository was archived by the owner on Oct 16, 2025. It is now read-only.

Conversation

@JakubDziurdziewicz
Copy link

Add CodeQL Advanced Security Analysis

This PR adds comprehensive CodeQL security scanning to the repository.

What's Included

  • Universal CodeQL configuration that works with any language mix
  • Automatic exclusion of unsupported file types (T-SQL, config files, etc.)
  • Security and quality queries for comprehensive vulnerability detection
  • Scheduled weekly scans to catch new security issues

Supported Languages

  • Python, JavaScript, TypeScript, Java, C#, Go, and more
  • Automatically detects and scans only supported languages
  • Excludes unsupported files like SQL scripts and configuration files

Next Steps

  1. Review the configuration in .github/workflows/codeql.yml
  2. Merge this PR to enable CodeQL scanning
  3. Monitor results in the Security → Code scanning tab

Note: This advanced CodeQL setup will replace the default CodeQL configuration to prevent conflicts.

Configuration Details

  • Uses security-and-quality query suite for comprehensive coverage
  • Runs on push, PR, and weekly schedule
  • Automatically handles build processes for supported languages
  • Excludes test files, documentation, and build artifacts

This PR was automatically generated by the CodeQL deployment script.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants