You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Click the `Set up this workflow` button by CodeQL Analysis.
42
42
@@ -53,7 +53,7 @@ See the [documentation](https://docs.github.com/en/free-pro-team@latest/github/f
53
53
<summary>Actions Workflow file</summary>
54
54
<p>
55
55
56
-
####Actions Workflow
56
+
### Actions Workflow
57
57
58
58
The Actions Workflow file contains a number of different steps including:
59
59
1. Checking out the repository
@@ -75,7 +75,7 @@ Click `Start Commit` -> `Commit new file` to commit the changes to _main_ branch
75
75
<summary>Workflow triggers</summary>
76
76
<p>
77
77
78
-
####Workflow triggers
78
+
### Workflow triggers
79
79
80
80
There are a [number of events](https://docs.github.com/en/free-pro-team@latest/actions/reference/events-that-trigger-workflows) that can trigger a GitHub Actions workflow. In this example, the workflow will be triggered on
81
81
@@ -96,7 +96,7 @@ Setting up the new CodeQL workflow and committing it to _main_ branch in the ste
96
96
97
97
<p>
98
98
99
-
####GitHub Actions Progress
99
+
### GitHub Actions Progress
100
100
101
101
Click `Actions` tab -> `CodeQL`
102
102
@@ -116,7 +116,7 @@ Once the Workflow has completed, click the `Security` tab -> `Code scanning aler
After the Workflow has completed click on `Details` by the `Code Scanning Results / CodeQL` status check.
186
186
187
187
<imgsrc="images/13-fix-pr-done.png"width="80%"/>
188
188
189
-
####Fixed Alert
189
+
### Fixed Alert
190
190
191
191
Notice that Code Scanning has detected that this Pull Request will fix the SQL injection vulnerabilities which were detected before.
192
192
193
193
<imgsrc="images/14-fix-detail.png"width="80%"/>
194
194
195
195
Merge the Pull Request. After the Pull Request has been merged, another Workflow will kick off to scan the repository for any vulnerabilties.
196
196
197
-
####Closed Security Alerts
197
+
### Closed Security Alerts
198
198
199
199
After the final Workflow has completed, navigate back to the `Security` tab and click `Closed`. Notice that the **Query built from user-controlled sources** security alert now shows up as a closed issue.
200
200
201
201
<imgsrc="images/15-fixed-alert.png"width="80%"/>
202
202
203
-
####Traceability
203
+
### Traceability
204
204
205
205
Click on the security alert and notice that it details when the fix was made, by whom, and the specific commit. This provides full traceability to detail when and how a security alert was fixed and exactly what was changed to remediate the issue.
0 commit comments