Issues: github/codeql
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
False positive - when json.Marshal output is used - cant result in "Potentially unsafe quoting"
false-positive
#14159
opened Sep 7, 2023 by
davidhadas
CodeQL does not detect SSL certificate validation vulnerabilities in Apache HttpComponents
Java
question
Further information is requested
#14156
opened Sep 6, 2023 by
ebickle
SIGSEGV (code 134) during "Finalizing database" step
question
Further information is requested
#14138
opened Sep 5, 2023 by
viktornordling
Incorrect escaping of SARIF message.text
question
Further information is requested
#14128
opened Sep 4, 2023 by
Rivierg
Size of CodeQL binary distribution has almost trippled since 2021
question
Further information is requested
#14125
opened Sep 3, 2023 by
intrigus-lgtm
Go: Tainted data does not propagate data flow after append function
question
Further information is requested
#14116
opened Sep 1, 2023 by
Jokuuy
CodeQL analysis successful but upload not showing up in GitHub
question
Further information is requested
#14107
opened Aug 31, 2023 by
woutervanranst
codeql pack publish fails with confusing SocketException when token lacks permission
CodeQL packaging
enhancement
New feature or request
#14104
opened Aug 30, 2023 by
ebickle
[Android] Custom app permission
question
Further information is requested
#14094
opened Aug 30, 2023 by
firmianay
CodeQL detected code written in Java but could not process any of it.General issue
question
Further information is requested
#14066
opened Aug 28, 2023 by
um3ha4a
Python: False positive for blank space characters
false-positive
#14022
opened Aug 22, 2023 by
a2ruan
Question: Extending Query (UnsafeDeserialization.ql) for CWE-502
Python
question
Further information is requested
#14004
opened Aug 19, 2023 by
krasnopg
CodeQL for php
question
Further information is requested
#14000
opened Aug 18, 2023 by
ArkaprabhaChakraborty
C++ extractor fails to process code based on Unreal Engine
question
Further information is requested
#13994
opened Aug 18, 2023 by
artem-smotrakov
go 1.21 support
acknowledged
GitHub staff acknowledges this issue
question
Further information is requested
#13992
opened Aug 17, 2023 by
vadimi-ep
could hasFlow support multi core?
question
Further information is requested
#13963
opened Aug 15, 2023 by
18Fl
Codeql usage under arm architecture
question
Further information is requested
#13953
opened Aug 14, 2023 by
yisong17tao
Customizing CMAKE_CXX_FLAGS is not possible with codeql-cli auto-build
question
Further information is requested
#13950
opened Aug 12, 2023 by
quericy
False positive, cpp/ql/src/Security/CWE/CWE-120/BadlyBoundedWrite.ql
C++
false-positive
#13913
opened Aug 7, 2023 by
peternmartin
UseAfterFree.ql miss case 01
question
Further information is requested
#13897
opened Aug 7, 2023 by
18Fl
preload tracer sets errno
question
Further information is requested
#13894
opened Aug 5, 2023 by
Ninja3047
Release preparation commits show "invalid-email-address" on GitHub
question
Further information is requested
#13868
opened Aug 2, 2023 by
Marcono1234
How to make the codeql aware a function called between the path.
question
Further information is requested
#13865
opened Aug 1, 2023 by
18Fl
Previous Next
ProTip!
Add no:assignee to see everything that’s not assigned.

