CodeQL query help for RubyΒΆ
Visit the articles below to see the documentation for the queries included in the following query suites:
code-scanning: queries run by default in CodeQL code scanning on GitHub.security-extended: queries fromcode-scanning, plus extra security queries with slightly lower precision and severity.security-and-quality: queries fromcode-scanning,security-extended, plus extra maintainability and reliability queries.
For shorter queries that you can use as building blocks when writing your own queries, see the example queries in the CodeQL repository.
- Bad HTML filtering regexp
- CSRF protection disabled
- Code injection
- Deserialization of user-controlled data
- Hard-coded credentials
- Inefficient regular expression
- Polynomial regular expression used on uncontrolled data
- Reflected server-side cross-site scripting
- Regular expression injection
- Request without certificate validation
- SQL query built from user-controlled sources
- Stored cross-site scripting
- URL redirection from remote source
- Uncontrolled command line
- Uncontrolled data used in network request
- Uncontrolled data used in path expression
- Use of
Kernel.openorIO.read - XML external entity expansion

