|
| 1 | +# Use this configuration file when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs. |
| 2 | +# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :) |
| 3 | +# NOTE: This configuration will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers. |
| 4 | + |
| 5 | +name: "Synthetic Apps All Queries Config" |
| 6 | + |
| 7 | +# expand thread model - https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#extending-codeql-coverage-with-threat-models |
| 8 | +threat-models: local |
| 9 | + |
| 10 | +# start from scratch - https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#disabling-the-default-queries |
| 11 | +disable-default-queries: true |
| 12 | + |
| 13 | +packs: |
| 14 | + # All queries from the CodeQL Built in packs (including low/no precision queries) |
| 15 | + - codeql/cpp-queries:. |
| 16 | + - codeql/csharp-queries:. |
| 17 | + - codeql/go-queries:. |
| 18 | + - codeql/java-queries:. |
| 19 | + - codeql/javascript-queries:. |
| 20 | + - codeql/python-queries:. |
| 21 | + - codeql/ruby-queries:. |
| 22 | + - codeql/swift-queries:. |
| 23 | + |
| 24 | + # OSS queries from the default suites |
| 25 | + |
| 26 | + ### GitHub Security Lab### |
| 27 | + # Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries) |
| 28 | + - githubsecuritylab/codeql-cpp-queries |
| 29 | + - githubsecuritylab/codeql-csharp-queries |
| 30 | + - githubsecuritylab/codeql-go-queries |
| 31 | + - githubsecuritylab/codeql-java-queries |
| 32 | + - githubsecuritylab/codeql-javascript-queries |
| 33 | + - githubsecuritylab/codeql-python-queries |
| 34 | + - githubsecuritylab/codeql-ruby-queries |
| 35 | + |
| 36 | + # Queries via Community Packs that use local sources https://github.com/GitHubSecurityLab/CodeQL-Community-Packs |
| 37 | + - githubsecuritylab/codeql-java-queries:suites/java-local.qls |
| 38 | + - githubsecuritylab/codeql-python-queries:suites/python-local.qls |
| 39 | + |
| 40 | + # Data extensions via Community Packs for libraries (library ext models are those generated by the corresponding queries in src) https://github.com/GitHubSecurityLab/CodeQL-Community-Packs |
| 41 | + - githubsecuritylab/codeql-csharp-library-sources |
| 42 | + - githubsecuritylab/codeql-java-library-sources |
| 43 | + |
| 44 | + # Data extensions via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs |
| 45 | + - githubsecuritylab/codeql-csharp-extensions |
| 46 | + - githubsecuritylab/codeql-java-extensions |
| 47 | + |
| 48 | + ### Trail of Bits ### |
| 49 | + # Queris via packs: https://github.com/trailofbits/codeql-queries (default suites include security + crypto |
| 50 | + - trailofbits/cpp-queries |
| 51 | + - trailofbits/go-queries |
| 52 | + |
| 53 | +# Start with Security Experimental (lightly documented: https://github.com/github/codeql/pull/11702) : https://github.com/github/codeql/blob/main/misc/suite-helpers/security-experimental-selectors.yml |
| 54 | +# - precision ( low + Low or EXCLUDED precision) |
| 55 | +# + problem.severity: recommendation |
| 56 | +# - restriction of no experimental folder |
| 57 | +# - restriction of audit/debugging queries from community packs |
| 58 | +query-filters: |
| 59 | + - include: |
| 60 | + kind: |
| 61 | + - problem |
| 62 | + - path-problem |
| 63 | + tags contain: |
| 64 | + - security |
| 65 | + - include: |
| 66 | + kind: |
| 67 | + - diagnostic |
| 68 | + - include: |
| 69 | + kind: |
| 70 | + - metric |
| 71 | + tags contain: |
| 72 | + - summary |
| 73 | + - exclude: |
| 74 | + deprecated: // |
| 75 | + - exclude: |
| 76 | + query path: |
| 77 | + # REMOVE exclude - OK even if they exist in experimental folder |
| 78 | + #- /^experimental\/.*/ |
| 79 | + - Metrics/Summaries/FrameworkCoverage.ql |
| 80 | + - /Diagnostics/Internal/.*/ |
| 81 | + - exclude: |
| 82 | + tags contain: |
| 83 | + - modeleditor |
| 84 | + - modelgenerator |
| 85 | + # Exclude audit queries from the CodeQL Built in packs |
| 86 | + - exclude: |
| 87 | + id: |
| 88 | + - cpp/untrusted-data-to-external-api |
| 89 | + - cs/untrusted-data-to-external-api |
| 90 | + - go/untrusted-data-to-external-api |
| 91 | + - java/untrusted-data-to-external-api |
| 92 | + - js/untrusted-data-to-external-api |
| 93 | + - py/untrusted-data-to-external-api |
| 94 | + |
| 95 | + # Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs) |
| 96 | + - exclude: |
| 97 | + tags contain: |
| 98 | + - debugging |
| 99 | + - audit |
| 100 | + |
| 101 | +#Additional extractor excludes: https://github.com/github/codeql/blob/768e5190a1c9d40a4acc7143c461c3b114e7fd59/javascript/extractor/src/com/semmle/js/extractor/AutoBuild.java#L421-L427C42 |
| 102 | +paths-ignore: |
| 103 | + # Python |
| 104 | + - "vendor/**" |
| 105 | + - "examples/**" |
| 106 | + - "tests/**" |
| 107 | + |
| 108 | + # JavaScript |
| 109 | + - "node_modules" |
| 110 | + - "**/*.test.js" |
| 111 | + - "**/*.test.tsx" |
| 112 | + - "**/*.spec.ts" |
| 113 | + - "**/*.spec.tsx" |
| 114 | + - "dist" |
0 commit comments