CodeQL query help for RubyΒΆ
Visit the articles below to see the documentation for the queries included in the following query suites:
code-scanning: queries run by default in CodeQL code scanning on GitHub.security-extended: queries fromcode-scanning, plus extra security queries with slightly lower precision and severity.security-and-quality: queries fromcode-scanning,security-extended, plus extra maintainability and reliability queries.
For shorter queries that you can use as building blocks when writing your own queries, see the example queries in the CodeQL repository.
- Bad HTML filtering regexp
 - CSRF protection disabled
 - Code injection
 - Deserialization of user-controlled data
 - Hard-coded credentials
 - Inefficient regular expression
 - Polynomial regular expression used on uncontrolled data
 - Reflected server-side cross-site scripting
 - Regular expression injection
 - Request without certificate validation
 - SQL query built from user-controlled sources
 - Stored cross-site scripting
 - URL redirection from remote source
 - Uncontrolled command line
 - Uncontrolled data used in network request
 - Uncontrolled data used in path expression
 - Use of 
Kernel.openorIO.read - XML external entity expansion
 

