CodeQL 2.20.6 Release: Enhanced Support and Improved Accuracy 🎯 #153749
Unanswered
ghostinhershell
asked this question in
Code Security
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
We are excited to announce the release of CodeQL 2.20.6, the static analysis engine behind GitHub code scanning. This update brings support for a new version of Java and a variety of other improvements that enhance the accuracy of your code scanning results.
Key Updates in CodeQL 2.20.6
Java
java/xssquery has been improved whenjavax.servlet.http.HttpServletResponseis used without an exploitable content type.JavaScript / TypeScript
responsethreat model, which can be enabled with advanced setup. When enabled, the response data coming back from an outgoing HTTP request is considered a tainted source.C/C++
cpp/static-buffer-overflowquery, leading to better detection of potential issues.C#
cs/call-to-object-tostringquery, resulting in more accurate analysis results.GitHub Actions (Public Preview)
actions/unversioned-immutable-actionquery has been removed from the public suite of queries, closing any alerts triggered from it.Availability and Further Information
Every new version of CodeQL is automatically deployed to users of GitHub code scanning on GitHub.com. The new functionality in CodeQL 2.20.6 will also be included in GitHub Enterprise Server (GHES) version 3.17. If you use an older version of GHES, you can manually upgrade your CodeQL version.
For a full list of changes, please refer to the complete changelog for version 2.20.6.
Stay secure with the latest enhancements in CodeQL!
Beta Was this translation helpful? Give feedback.
All reactions