-
**Describe the bug**
This repo is using CodeQL for SAST scanning:
https://github.com/secureIO-GmbH/VulnerabilityHeatmap/actions/workflows/github-code-scanning/codeql
**Reproduction steps**
Ste…
-
### What's the problem this feature will solve?
This is following on from https://github.com/pypa/pip/issues/12564 to discuss whether pip maintainers would be interested in enabling [CodeQL SAST sc…
wwuck updated
8 months ago
-
Hi comunity,
I'm trying to set up the GitHub action for our internal Fortify SSC.
When I'm using the following setup:
```
name: Fortify
on:
push:
branches:
- main
pull_r…
-
### Describe the User Story
As a security minded engineer,
so that the code is more secure,
I want to have SAST in a CI workflow
### Acceptance Criteria
There is a SAST scanner in the CI workfl…
-
We've recently started using audit-ci in our pipelines. For the tool semgrep that we use, they can output a Gitlab SAST compatible reporting format that GitLab can understand and integrate into its UI…
-
The following section Implementation/Secure Build/Build Process (Maturity Level 2) has the following line "Finally, add appropriate automated security checks (e.g. using SAST tools) in the pipeline to…
-
Roja-pipeline
| Severity | Security Category | Context | Rule Key | File Name | File Line |
|---|---|---|---|---|---|
| CRITICAL | permission | Copying recursively might inadvertantly acid sensitive…
-
See details [here](https://examplesasttool.com/app/issue/38572946895)
-
I suggest a slight-reordering and restructuring, based upon initial feedback of our 2024 edition (as well as my experience teaching some of this):
**Our current (2024) OWASP Top 10 Proactive Contro…
-
Context: https://github.com/google/brotli/security/code-scanning/4
Quick view on actions panel reveals that report is not true: https://github.com/google/brotli/actions/workflows/codeql.yml?query=bra…