CodeQL query help for RubyΒΆ
Visit the articles below to see the documentation for the queries included in the following query suites:
default: queries run by default in CodeQL code scanning on GitHub.security-extended: queries fromdefault, plus extra security queries with slightly lower precision and severity.security-and-quality: queries fromdefault,security-extended, plus extra maintainability and reliability queries.
These queries are published in the CodeQL query pack codeql/ruby-queries (changelog, source).
For shorter queries that you can use as building blocks when writing your own queries, see the example queries in the CodeQL repository.
- Bad HTML filtering regexp
 - Badly anchored regular expression
 - CSRF protection weakened or disabled
 - Clear-text logging of sensitive information
 - Clear-text storage of sensitive information
 - Code injection
 - Dependency download using unencrypted communication channel
 - Deserialization of user-controlled data
 - Download of sensitive file through insecure connection
 - Hard-coded credentials
 - Hard-coded data interpreted as code
 - Incomplete URL substring sanitization
 - Incomplete multi-character sanitization
 - Incomplete regular expression for hostnames
 - Incomplete string escaping or encoding
 - Inefficient regular expression
 - Information exposure through an exception
 - Log injection
 - Missing regular expression anchor
 - Network data written to file
 - Overly permissive regular expression range
 - Polynomial regular expression used on uncontrolled data
 - Reflected server-side cross-site scripting
 - Regular expression injection
 - Request without certificate validation
 - SQL query built from user-controlled sources
 - Sensitive data read from GET request
 - Server-side request forgery
 - Stored cross-site scripting
 - URL redirection from remote source
 - Uncontrolled command line
 - Uncontrolled data used in path expression
 - Unsafe HTML constructed from library input
 - Unsafe code constructed from library input
 - Unsafe shell command constructed from library input
 - Use of 
Kernel.openorIO.reador similar sinks with a non-constant value - Use of 
Kernel.open,IO.reador similar sinks with user-controlled input - Use of a broken or weak cryptographic algorithm
 - Use of externally-controlled format string
 - Weak cookie configuration
 - XML external entity expansion
 

