News
In the background, this new feature uses the CodeQL engine, GitHub’s semantic analysis engine to find vulnerabilities in code, even before it has been executed.
Prior to making CodeQL available for free for open source code, Semmle provided it as a commercially available service. It is still available under a commercial license for private code repositories.
Microsoft has open-sourced CodeQL queries that developers can use to scan source code for malicious implants matching the SolarWinds supply-chain attack. In December, it was disclosed that threat ...
Microsoft has open sourced the CodeQL queries that it used to identify malicious code implants from the Solorigate attack. CodeQL is an analysis engine used for code inspection, among other things.
Microsoft's CodeQL queries check for "syntactic" traits associated with the Solorigate attacks, which are defined as code bits that are considered to be easy to alter or that turned up as ...
Microsoft is open-sourcing the CodeQL queries that it used to investigate the impact of Sunburst or Solarigate malware planted in the SolarWinds Orion software updates. Other organizations can use ...
After you hit "Enable CodeQL," code scanning will immediately start looking for vulnerabilities in the repo to help you patch the flaws it finds and create more secure software.
One year after acquiring software security scanning specialist Semmle, and following a successful five-month beta process, GitHub is making its CodeQL code scanning capabilities available publicly ...
The tool is powered by CodeQL---an open-source semantic code analyzer. The scanner can work in real-time as code is entered, so flaws never get to the software's final production version.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results