-
Updated
Sep 19, 2020 - CodeQL
#
codeql
Here are 16 public repositories matching this topic...
CodeQL: the libraries and queries that power security researchers around the world, as well as code scanning in GitHub Advanced Security (code scanning), LGTM.com, and LGTM Enterprise
Define and run pattern-based custom linting rules
-
Updated
Sep 1, 2020 - Go
The CodeQL extractor and libraries for Go.
-
Updated
Sep 18, 2020 - CodeQL
jcreedcmu
commented
Apr 28, 2020
After a query is run, we should allow exporting the results as a SARIF file --- in the implementation, this will actually be nearly trivial, as we already use the codeql cli to create a SARIF file during interpretation, and store it in a workspace-local state directory. A solution could simply be to provide a way of conveniently opening this file within vscode (from the query history view, or from
Starter workspace to use with the CodeQL extension for Visual Studio Code.
-
Updated
Sep 15, 2020 - CodeQL
Prepackaged and precompiled github codeql container for rapid analysis, deployment and development.
-
Updated
Aug 21, 2020 - Python
Generate CodeQL taint-tracking for Go (along with tests) in a graphical UI
-
Updated
Sep 9, 2020 - JavaScript
-
Updated
Jul 19, 2020 - TypeScript
-
Updated
Apr 30, 2020 - CodeQL
Improve this page
Add a description, image, and links to the codeql topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the codeql topic, visit your repo's landing page and select "manage topics."
This issue relates to the sort-imports rule.
During the transition from TSLint (now deprecated) to ESLint for typescript linting we introduced some new rules that don't yet pass and added a temporary override in the
.eslintrc.jsonfile to temporarily disable them.This issue covers removing that temporary override and any changes to the typescr