-
Notifications
You must be signed in to change notification settings - Fork 93
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Security Scan: CodeQL workflow #170
Conversation
Thanks for the PR 👍 Can you please add:
|
I have added the hyperlink to the fork run. Also I have tried adding the C++ scan, but CodeQL fails to automatically build the C++ code. Similarly in the C++ SDK CodeQL work flow there was a simple setup step where I had to setup the manual dependencies/tools - perhaps you can point me to the manual dependencies / tooling setup for the C++ portion? |
I hope this will be helpful:
|
I opened an issue to add C++ code scanning - #178 . To avoid delay, is it possible to approve this pull-request and merge in the C# CodeQL scanning. |
Motivation
This PR is a follow-up to issue open-telemetry/oteps#144
CodeQL is GitHub's static analysis engine which scans repos for security vulnerabilities. As the project grows and we near GA it might be useful to have a workflow which checks for security vulnerabilities to ensure that every incremental change is following best development practices. Also passing basic security checks will also make sure that there aren't any glaring issues for our users.
Changes
Current CodeQL run from fork
Workflow Triggers