Skip to content

Commit c0cbefc

Browse files
authored
Add sample synthetic suites
1 parent 3a9acb5 commit c0cbefc

7 files changed

+406
-0
lines changed

suites/synthetics-cpp.qls

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
# Use this query suite when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs.
2+
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3+
# NOTE: This suite will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers.
4+
# NOTE: A suite cannot exclude directories from the scan. Consider pairing with a codeql-config.yml that excludes unwanted folders with `paths-ignore`
5+
# NOTE: A suite cannot include library packs that contain data extensions. Consider pairing with a codeql-config.yml that includes needed data models.
6+
7+
# Run the following pack install commands to prime your workspace or run the analyze command using `--download` flag
8+
#codeql pack download codeql/cpp-queries
9+
#codeql pack download githubsecuritylab/codeql-cpp-queries
10+
#codeql pack download trailofbits/cpp-queries
11+
12+
# All queries from CodeQL built in query packs
13+
- queries: '.'
14+
from: codeql/cpp-queries
15+
16+
# Curated packs from community repos
17+
18+
### GitHub Security Lab ###
19+
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
20+
- qlpack: githubsecuritylab/codeql-cpp-queries
21+
22+
### Trail of Bits ###
23+
# Queries via packs: https://github.com/trailofbits/codeql-queries (default suites include security + crypto)
24+
- qlpack: trailofbits/cpp-queries
25+
26+
- include:
27+
kind:
28+
- problem
29+
- path-problem
30+
tags contain:
31+
- security
32+
- include:
33+
kind:
34+
- diagnostic
35+
- include:
36+
kind:
37+
- metric
38+
tags contain:
39+
- summary
40+
- exclude:
41+
deprecated: //
42+
- exclude:
43+
query path:
44+
# REMOVE exclude - OK even if they exist in experimental folder
45+
#- /^experimental\/.*/
46+
- Metrics/Summaries/FrameworkCoverage.ql
47+
- /Diagnostics/Internal/.*/
48+
- exclude:
49+
tags contain:
50+
- modeleditor
51+
- modelgenerator
52+
# Exclude audit queries from the CodeQL Built in packs
53+
- exclude:
54+
id:
55+
- cpp/untrusted-data-to-external-api
56+
# Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs)
57+
- exclude:
58+
tags contain:
59+
- debugging
60+
- audit

suites/synthetics-csharp.qls

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
# Use this query suite when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs.
2+
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3+
# NOTE: This suite will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers.
4+
# NOTE: A suite cannot exclude directories from the scan. Consider pairing with a codeql-config.yml that excludes unwanted folders with `paths-ignore`
5+
# NOTE: A suite cannot include library packs that contain data extensions. Consider pairing with a codeql-config.yml that includes needed data models.
6+
7+
# Run the following pack install commands to prime your workspace or run the analyze command using `--download` flag
8+
#codeql pack download codeql/csharp-queries
9+
#codeql pack download githubsecuritylab/codeql-csharp-queries
10+
11+
# All queries from CodeQL built in query packs
12+
- queries: '.'
13+
from: codeql/csharp-queries
14+
15+
# Curated packs from community repos
16+
17+
### GitHub Security Lab ###
18+
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
19+
- qlpack: githubsecuritylab/codeql-csharp-queries
20+
21+
22+
- include:
23+
kind:
24+
- problem
25+
- path-problem
26+
tags contain:
27+
- security
28+
- include:
29+
kind:
30+
- diagnostic
31+
- include:
32+
kind:
33+
- metric
34+
tags contain:
35+
- summary
36+
- exclude:
37+
deprecated: //
38+
- exclude:
39+
query path:
40+
# REMOVE exclude - OK even if they exist in experimental folder
41+
#- /^experimental\/.*/
42+
- Metrics/Summaries/FrameworkCoverage.ql
43+
- /Diagnostics/Internal/.*/
44+
- exclude:
45+
tags contain:
46+
- modeleditor
47+
- modelgenerator
48+
# Exclude audit queries from the CodeQL Built in packs
49+
- exclude:
50+
id:
51+
- csharp/untrusted-data-to-external-api
52+
# Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs)
53+
- exclude:
54+
tags contain:
55+
- debugging
56+
- audit

suites/synthetics-go.qls

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
# Use this query suite when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs.
2+
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3+
# NOTE: This suite will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers.
4+
# NOTE: A suite cannot exclude directories from the scan. Consider pairing with a codeql-config.yml that excludes unwanted folders with `paths-ignore`
5+
# NOTE: A suite cannot include library packs that contain data extensions. Consider pairing with a codeql-config.yml that includes needed data models.
6+
7+
# Run the following pack install commands to prime your workspace or run the analyze command using `--download` flag
8+
#codeql pack download codeql/go-queries
9+
#codeql pack download githubsecuritylab/codeql-go-queries
10+
#codeql pack download trailofbits/go-queries
11+
12+
# All queries from CodeQL built in query packs
13+
- queries: '.'
14+
from: codeql/go-queries
15+
16+
# Curated packs from community repos
17+
18+
### GitHub Security Lab ###
19+
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
20+
- qlpack: githubsecuritylab/codeql-go-queries
21+
22+
### Trail of Bits ###
23+
# Queries via packs: https://github.com/trailofbits/codeql-queries (default suites include security + crypto)
24+
- qlpack: trailofbits/go-queries
25+
26+
- include:
27+
kind:
28+
- problem
29+
- path-problem
30+
tags contain:
31+
- security
32+
- include:
33+
kind:
34+
- diagnostic
35+
- include:
36+
kind:
37+
- metric
38+
tags contain:
39+
- summary
40+
- exclude:
41+
deprecated: //
42+
- exclude:
43+
query path:
44+
# REMOVE exclude - OK even if they exist in experimental folder
45+
#- /^experimental\/.*/
46+
- Metrics/Summaries/FrameworkCoverage.ql
47+
- /Diagnostics/Internal/.*/
48+
- exclude:
49+
tags contain:
50+
- modeleditor
51+
- modelgenerator
52+
# Exclude audit queries from the CodeQL Built in packs
53+
- exclude:
54+
id:
55+
- go/untrusted-data-to-external-api
56+
# Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs)
57+
- exclude:
58+
tags contain:
59+
- debugging
60+
- audit

suites/synthetics-java.qls

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
# Use this query suite when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs.
2+
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3+
# NOTE: This suite will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers.
4+
# NOTE: A suite cannot exclude directories from the scan. Consider pairing with a codeql-config.yml that excludes unwanted folders with `paths-ignore`
5+
# NOTE: A suite cannot include library packs that contain data extensions. Consider pairing with a codeql-config.yml that includes needed data models.
6+
7+
# Run the following pack install commands to prime your workspace or run the analyze command using `--download` flag
8+
#codeql pack download codeql/java-queries
9+
#codeql pack download githubsecuritylab/codeql-java-queries
10+
11+
# All queries from CodeQL built in query packs
12+
- queries: '.'
13+
from: codeql/java-queries
14+
15+
# Curated packs from community repos
16+
17+
### GitHub Security Lab ###
18+
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
19+
- qlpack: githubsecuritylab/codeql-java-queries
20+
21+
# Queries via Community Packs that use local sources https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
22+
- qlpack: githubsecuritylab/codeql-java-queries:suites/java-local.qls
23+
24+
25+
- include:
26+
kind:
27+
- problem
28+
- path-problem
29+
tags contain:
30+
- security
31+
- include:
32+
kind:
33+
- diagnostic
34+
- include:
35+
kind:
36+
- metric
37+
tags contain:
38+
- summary
39+
- exclude:
40+
deprecated: //
41+
- exclude:
42+
query path:
43+
# REMOVE exclude - OK even if they exist in experimental folder
44+
#- /^experimental\/.*/
45+
- Metrics/Summaries/FrameworkCoverage.ql
46+
- /Diagnostics/Internal/.*/
47+
- exclude:
48+
tags contain:
49+
- modeleditor
50+
- modelgenerator
51+
# Exclude audit queries from the CodeQL Built in packs
52+
- exclude:
53+
id:
54+
- java/untrusted-data-to-external-api
55+
# Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs)
56+
- exclude:
57+
tags contain:
58+
- debugging
59+
- audit

suites/synthetics-javascript.qls

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
# Use this query suite when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs.
2+
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3+
# NOTE: This suite will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers.
4+
# NOTE: A suite cannot exclude directories from the scan. Consider pairing with a codeql-config.yml that excludes unwanted folders with `paths-ignore`
5+
# NOTE: A suite cannot include library packs that contain data extensions. Consider pairing with a codeql-config.yml that includes needed data models.
6+
7+
# Run the following pack install commands to prime your workspace or run the analyze command using `--download` flag
8+
#codeql pack download codeql/javascript-queries
9+
#codeql pack download githubsecuritylab/codeql-javascript-queries
10+
11+
# All queries from CodeQL built in query packs
12+
- queries: '.'
13+
from: codeql/javascript-queries
14+
15+
# Curated packs from community repos
16+
17+
### GitHub Security Lab ###
18+
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
19+
- qlpack: githubsecuritylab/codeql-javascript-queries
20+
21+
22+
- include:
23+
kind:
24+
- problem
25+
- path-problem
26+
tags contain:
27+
- security
28+
- include:
29+
kind:
30+
- diagnostic
31+
- include:
32+
kind:
33+
- metric
34+
tags contain:
35+
- summary
36+
- exclude:
37+
deprecated: //
38+
- exclude:
39+
query path:
40+
# REMOVE exclude - OK even if they exist in experimental folder
41+
#- /^experimental\/.*/
42+
- Metrics/Summaries/FrameworkCoverage.ql
43+
- /Diagnostics/Internal/.*/
44+
- exclude:
45+
tags contain:
46+
- modeleditor
47+
- modelgenerator
48+
# Exclude audit queries from the CodeQL Built in packs
49+
- exclude:
50+
id:
51+
- javascript/untrusted-data-to-external-api
52+
# Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs)
53+
- exclude:
54+
tags contain:
55+
- debugging
56+
- audit

suites/synthetics-python.qls

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
# Use this query suite when looking to get the broadest coverage of security results from the CodeQL Built in packs and the GitHub Security Lab Community packs.
2+
# WARNING: A notable amount of false positives may be found in this configuration. If you wish to reduce the number of false positives, use the default codeql suites :)
3+
# NOTE: This suite will not include audit level queries intended for gathering information about the codebase, and debugging queries intended for CodeQL developers.
4+
# NOTE: A suite cannot exclude directories from the scan. Consider pairing with a codeql-config.yml that excludes unwanted folders with `paths-ignore`
5+
# NOTE: A suite cannot include library packs that contain data extensions. Consider pairing with a codeql-config.yml that includes needed data models.
6+
7+
# Run the following pack install commands to prime your workspace or run the analyze command using `--download` flag
8+
#codeql pack download codeql/python-queries
9+
#codeql pack download githubsecuritylab/codeql-python-queries
10+
11+
# All queries from CodeQL built in query packs
12+
- queries: '.'
13+
from: codeql/python-queries
14+
15+
# Curated packs from community repos
16+
17+
### GitHub Security Lab ###
18+
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
19+
- qlpack: githubsecuritylab/codeql-python-queries
20+
21+
# Queries via Community Packs that use local sources https://github.com/GitHubSecurityLab/CodeQL-Community-Packs
22+
- qlpack: githubsecuritylab/codeql-python-queries:suites/python-local.qls
23+
24+
25+
- include:
26+
kind:
27+
- problem
28+
- path-problem
29+
tags contain:
30+
- security
31+
- include:
32+
kind:
33+
- diagnostic
34+
- include:
35+
kind:
36+
- metric
37+
tags contain:
38+
- summary
39+
- exclude:
40+
deprecated: //
41+
- exclude:
42+
query path:
43+
# REMOVE exclude - OK even if they exist in experimental folder
44+
#- /^experimental\/.*/
45+
- Metrics/Summaries/FrameworkCoverage.ql
46+
- /Diagnostics/Internal/.*/
47+
- exclude:
48+
tags contain:
49+
- modeleditor
50+
- modelgenerator
51+
# Exclude audit queries from the CodeQL Built in packs
52+
- exclude:
53+
id:
54+
- python/untrusted-data-to-external-api
55+
# Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs)
56+
- exclude:
57+
tags contain:
58+
- debugging
59+
- audit

0 commit comments

Comments
 (0)