Skip to content

Conversation

@JakubDziurdziewicz
Copy link
Contributor

Add CodeQL Advanced Security Analysis

This PR adds comprehensive CodeQL security scanning to the repository.

What's Included

  • Universal CodeQL configuration that works with any language mix
  • Automatic exclusion of unsupported file types (T-SQL, config files, etc.)
  • Security and quality queries for comprehensive vulnerability detection
  • Scheduled weekly scans to catch new security issues

Supported Languages

  • Python, JavaScript, TypeScript, Java, C#, Go, and more
  • Automatically detects and scans only supported languages
  • Excludes unsupported files like SQL scripts and configuration files

Next Steps

  1. Review the configuration in .github/workflows/codeql.yml
  2. Merge this PR to enable CodeQL scanning
  3. Monitor results in the Security → Code scanning tab

Note: This advanced CodeQL setup will replace the default CodeQL configuration to prevent conflicts.

Configuration Details

  • Uses security-and-quality query suite for comprehensive coverage
  • Runs on push, PR, and weekly schedule
  • Automatically handles build processes for supported languages
  • Excludes test files, documentation, and build artifacts

This PR was automatically generated by the CodeQL deployment script.

@JakubDziurdziewicz JakubDziurdziewicz merged commit 5ef32ba into master Oct 16, 2025
2 checks passed
@JakubDziurdziewicz JakubDziurdziewicz deleted the feature/CodeQL branch October 16, 2025 11:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants