Skip to content

Add CodeQL security analysis workflow#54

Closed
harshitkgupta wants to merge 1 commit intomainfrom
feat/codeql-workflow
Closed

Add CodeQL security analysis workflow#54
harshitkgupta wants to merge 1 commit intomainfrom
feat/codeql-workflow

Conversation

@harshitkgupta
Copy link

Summary

  • Add CodeQL static analysis workflow scanning JavaScript/TypeScript and Python code
  • Uses security-extended query suite for broader vulnerability detection beyond the default set
  • Runs as a matrix job (one per language) for parallel analysis

Triggers

Trigger When
pull_request PRs targeting main
push Merges to main
schedule Weekly on Mondays at 3 AM UTC

What it detects

  • SQL injection, XSS, command injection, path traversal
  • Hardcoded credentials, insecure crypto usage
  • Authentication/authorization issues
  • Data flow vulnerabilities (taint tracking)
  • Results appear in Security tab → Code scanning alerts and as PR annotations

Test plan

  • Verify CodeQL runs on this PR for both languages
  • Check Security tab for any initial findings after merge

🤖 Generated with Claude Code

Scan JavaScript/TypeScript and Python code for security vulnerabilities
on PRs to main, pushes to main, and weekly schedule. Uses
security-extended query suite for broader coverage.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@harshitkgupta harshitkgupta requested a review from a team March 7, 2026 06:25
@harshitkgupta harshitkgupta self-assigned this Mar 7, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant