codeql/go
Michael B. Gale 77369a09a4
Merge pull request #13872 from Kwstubbs/Kevin_error_sanitizer
Go: Add sanitizer to remove paths passing through http.Error
2023-09-04 13:25:55 +01:00
..
build
codeql-tools Apply suggestions from code review 2023-07-31 16:49:11 +01:00
docs/language/learn-ql/go
downgrades
external-packs/codeql/suite-helpers/0.0.2
extractor Merge pull request #13867 from github/mbg/go/1.21-support 2023-08-18 14:37:11 +01:00
extractor-smoke-test
old-change-notes
ql Merge pull request #13872 from Kwstubbs/Kevin_error_sanitizer 2023-09-04 13:25:55 +01:00
scripts
templates/project
tools
vendor Bump Go extractor dependencies 2023-08-08 22:23:47 +01:00
CODE_OF_CONDUCT.md
CONTRIBUTING.md
LICENSE
Makefile Add new files to CODEQL_TOOLS in Makefile 2023-07-31 16:12:52 +01:00
README.md
SECURITY.md
alert_weighting.properties
codeql-extractor.yml
go.mod Use Go 1.21 for extractor 2023-08-11 10:55:00 +01:00
go.sum Bump Go extractor dependencies 2023-08-08 22:23:47 +01:00

README.md

Go analysis support for CodeQL

This sub-folder contains the extractor, CodeQL libraries, and queries that power Go support for CodeQL.

It contains two major components:

  • an extractor, itself written in Go, that parses Go source code and converts it into a database that can be queried using CodeQL.
  • static analysis libraries and queries written in CodeQL that can be used to analyze such a database to find coding mistakes or security vulnerabilities.

Usage

To analyze a Go codebase, either use the CodeQL command-line interface to create a database yourself, or download a pre-built database from GitHub.com. You can then run any of the queries contained in this repository either on the command line or using the VS Code extension.

Contributions

Contributions are welcome! Please see our contribution guidelines and our code of conduct for details on how to participate in our community.

Licensing

The code in this repository is licensed under the MIT license.

Resources