Skip to content

Commit cc436e8

Browse files
committed
Merge branch 'santander-java-crypto-check' of https://github.com/bdrodes/codeql into santander-java-crypto-check
2 parents 354effe + 2b683c2 commit cc436e8

File tree

415 files changed

+13871
-1147
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

415 files changed

+13871
-1147
lines changed

CODEOWNERS

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,7 @@
1+
# Catch-all for anything which isn't matched by a line lower down
2+
* @github/code-scanning-alert-coverage
3+
4+
# CodeQL language libraries
15
/actions/ @github/codeql-dynamic
26
/cpp/ @github/codeql-c-analysis
37
/csharp/ @github/codeql-csharp
@@ -7,8 +11,10 @@
711
/java/ @github/codeql-java
812
/javascript/ @github/codeql-javascript
913
/python/ @github/codeql-python
14+
/ql/ @github/codeql-ql-for-ql-reviewers
1015
/ruby/ @github/codeql-ruby
1116
/rust/ @github/codeql-rust
17+
/shared/ @github/codeql-shared-libraries-reviewers
1218
/swift/ @github/codeql-swift
1319
/misc/codegen/ @github/codeql-swift
1420
/java/kotlin-extractor/ @github/codeql-kotlin
@@ -25,9 +31,6 @@
2531
/docs/codeql/ql-language-reference/ @github/codeql-frontend-reviewers
2632
/docs/query-*-style-guide.md @github/codeql-analysis-reviewers
2733

28-
# QL for QL reviewers
29-
/ql/ @github/codeql-ql-for-ql-reviewers
30-
3134
# Bazel (excluding BUILD.bazel files)
3235
MODULE.bazel @github/codeql-ci-reviewers
3336
.bazelversion @github/codeql-ci-reviewers

actions/ql/lib/CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Lines changed: 3 additions & 0 deletions
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
---
2-
lastReleaseVersion: 0.4.18
2+
lastReleaseVersion: 0.4.19

actions/ql/lib/qlpack.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
name: codeql/actions-all
2-
version: 0.4.19-dev
2+
version: 0.4.20-dev
33
library: true
44
warnOnImplicitThis: true
55
dependencies:

actions/ql/src/CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Lines changed: 3 additions & 0 deletions
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
---
2-
lastReleaseVersion: 0.6.10
2+
lastReleaseVersion: 0.6.11

actions/ql/src/experimental/Security/CWE-200/SecretExfiltration.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,5 +19,5 @@ import SecretExfiltrationFlow::PathGraph
1919
from SecretExfiltrationFlow::PathNode source, SecretExfiltrationFlow::PathNode sink
2020
where SecretExfiltrationFlow::flowPath(source, sink)
2121
select sink.getNode(), source, sink,
22-
"Potential secret exfiltration in $@, which may be be leaked to an attacker-controlled resource.",
22+
"Potential secret exfiltration in $@, which may be leaked to an attacker-controlled resource.",
2323
sink, sink.getNode().asExpr().(Expression).getRawExpression()

actions/ql/src/qlpack.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
name: codeql/actions-queries
2-
version: 0.6.11-dev
2+
version: 0.6.12-dev
33
library: false
44
warnOnImplicitThis: true
55
groups: [actions, queries]

0 commit comments

Comments
 (0)