Issues: github/codeql
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
Could Further information is requested
CallInstruction get virtual function target?
question
#14005
opened Aug 19, 2023 by
18Fl
Question: Extending Query (UnsafeDeserialization.ql) for CWE-502
question
Further information is requested
#14004
opened Aug 19, 2023 by
krasnopg
codeql query run and codeql database analyze produce different results
question
#14002
opened Aug 18, 2023 by
scottconstable
CodeQL for php
question
Further information is requested
#14000
opened Aug 18, 2023 by
ArkaprabhaChakraborty
C++ extractor fails to process code based on Unreal Engine
question
Further information is requested
#13994
opened Aug 18, 2023 by
artem-smotrakov
Incorrect value of string literals
question
Further information is requested
#13993
opened Aug 18, 2023 by
AdvenamTacet
go 1.21 support
acknowledged
GitHub staff acknowledges this issue
question
Further information is requested
#13992
opened Aug 17, 2023 by
vadimi-ep
Tree-Sitter Shared Extractor doesn't support extension-less files
question
Further information is requested
#13964
opened Aug 15, 2023 by
GeekMasher
could hasFlow support multi core?
question
Further information is requested
#13963
opened Aug 15, 2023 by
18Fl
Codeql usage under arm architecture
question
Further information is requested
#13953
opened Aug 14, 2023 by
yisong17tao
Customizing CMAKE_CXX_FLAGS is not possible with codeql-cli auto-build
question
Further information is requested
#13950
opened Aug 12, 2023 by
quericy
False positive, cpp/ql/src/Security/CWE/CWE-120/BadlyBoundedWrite.ql
C++
false-positive
#13913
opened Aug 7, 2023 by
peternmartin
UseAfterFree.ql miss case 01
question
Further information is requested
#13897
opened Aug 7, 2023 by
18Fl
preload tracer sets errno
question
Further information is requested
#13894
opened Aug 5, 2023 by
Ninja3047
Release preparation commits show "invalid-email-address" on GitHub
question
Further information is requested
#13868
opened Aug 2, 2023 by
Marcono1234
How to make the codeql aware a function called between the path.
question
Further information is requested
#13865
opened Aug 1, 2023 by
18Fl
codeql won't work with chromium special file
question
Further information is requested
#13849
opened Jul 31, 2023 by
18Fl
Go: support remote package analysis
question
Further information is requested
#13833
opened Jul 28, 2023 by
amammad
Question about connecting taint flows
question
Further information is requested
#13765
opened Jul 18, 2023 by
scottconstable
False positive for IncompleteHostnameRegExp in Ruby
false-positive
#13749
opened Jul 14, 2023 by
izuzak
Why is it that when CodeQL generates a database, some source code is not analyzed?
#13710
opened Jul 11, 2023 by
KingXS
C# False Positive Suggestion PathBase
acknowledged
GitHub staff acknowledges this issue
C#
false-positive
#13709
opened Jul 11, 2023 by
Kwstubbs
FP in C# XSS Sink
acknowledged
GitHub staff acknowledges this issue
C#
false-positive
#13707
opened Jul 10, 2023 by
Kwstubbs
Previous Next
ProTip!
Find all open issues with in progress development work with linked:pr.