Merge pull request #19355 from tamasvajk/test/add-query-suite-tests

Add query suite integration tests for swift, actions, csharp, go, javascript, ruby, rust
This commit is contained in:
Tamás Vajk
2025-04-25 15:37:51 +02:00
committed by GitHub
44 changed files with 1765 additions and 20 deletions

View File

@@ -0,0 +1,17 @@
ql/actions/ql/src/Security/CWE-077/EnvPathInjectionCritical.ql
ql/actions/ql/src/Security/CWE-077/EnvVarInjectionCritical.ql
ql/actions/ql/src/Security/CWE-094/CodeInjectionCritical.ql
ql/actions/ql/src/Security/CWE-1395/UseOfKnownVulnerableAction.ql
ql/actions/ql/src/Security/CWE-275/MissingActionsPermissions.ql
ql/actions/ql/src/Security/CWE-285/ImproperAccessControl.ql
ql/actions/ql/src/Security/CWE-312/ExcessiveSecretsExposure.ql
ql/actions/ql/src/Security/CWE-312/SecretsInArtifacts.ql
ql/actions/ql/src/Security/CWE-312/UnmaskedSecretExposure.ql
ql/actions/ql/src/Security/CWE-349/CachePoisoningViaCodeInjection.ql
ql/actions/ql/src/Security/CWE-349/CachePoisoningViaDirectCache.ql
ql/actions/ql/src/Security/CWE-349/CachePoisoningViaPoisonableStep.ql
ql/actions/ql/src/Security/CWE-367/UntrustedCheckoutTOCTOUCritical.ql
ql/actions/ql/src/Security/CWE-367/UntrustedCheckoutTOCTOUHigh.ql
ql/actions/ql/src/Security/CWE-829/ArtifactPoisoningCritical.ql
ql/actions/ql/src/Security/CWE-829/UntrustedCheckoutCritical.ql
ql/actions/ql/src/Security/CWE-829/UntrustedCheckoutHigh.ql

View File

@@ -0,0 +1,33 @@
ql/actions/ql/src/Debug/SyntaxError.ql
ql/actions/ql/src/Models/CompositeActionsSinks.ql
ql/actions/ql/src/Models/CompositeActionsSources.ql
ql/actions/ql/src/Models/CompositeActionsSummaries.ql
ql/actions/ql/src/Models/ReusableWorkflowsSinks.ql
ql/actions/ql/src/Models/ReusableWorkflowsSources.ql
ql/actions/ql/src/Models/ReusableWorkflowsSummaries.ql
ql/actions/ql/src/Security/CWE-077/EnvPathInjectionCritical.ql
ql/actions/ql/src/Security/CWE-077/EnvPathInjectionMedium.ql
ql/actions/ql/src/Security/CWE-077/EnvVarInjectionCritical.ql
ql/actions/ql/src/Security/CWE-077/EnvVarInjectionMedium.ql
ql/actions/ql/src/Security/CWE-094/CodeInjectionCritical.ql
ql/actions/ql/src/Security/CWE-094/CodeInjectionMedium.ql
ql/actions/ql/src/Security/CWE-1395/UseOfKnownVulnerableAction.ql
ql/actions/ql/src/Security/CWE-275/MissingActionsPermissions.ql
ql/actions/ql/src/Security/CWE-285/ImproperAccessControl.ql
ql/actions/ql/src/Security/CWE-312/ExcessiveSecretsExposure.ql
ql/actions/ql/src/Security/CWE-312/SecretsInArtifacts.ql
ql/actions/ql/src/Security/CWE-312/UnmaskedSecretExposure.ql
ql/actions/ql/src/Security/CWE-349/CachePoisoningViaCodeInjection.ql
ql/actions/ql/src/Security/CWE-349/CachePoisoningViaDirectCache.ql
ql/actions/ql/src/Security/CWE-349/CachePoisoningViaPoisonableStep.ql
ql/actions/ql/src/Security/CWE-367/UntrustedCheckoutTOCTOUCritical.ql
ql/actions/ql/src/Security/CWE-367/UntrustedCheckoutTOCTOUHigh.ql
ql/actions/ql/src/Security/CWE-571/ExpressionIsAlwaysTrueCritical.ql
ql/actions/ql/src/Security/CWE-571/ExpressionIsAlwaysTrueHigh.ql
ql/actions/ql/src/Security/CWE-829/ArtifactPoisoningCritical.ql
ql/actions/ql/src/Security/CWE-829/ArtifactPoisoningMedium.ql
ql/actions/ql/src/Security/CWE-829/UnpinnedActionsTag.ql
ql/actions/ql/src/Security/CWE-829/UntrustedCheckoutCritical.ql
ql/actions/ql/src/Security/CWE-829/UntrustedCheckoutHigh.ql
ql/actions/ql/src/Security/CWE-829/UntrustedCheckoutMedium.ql
ql/actions/ql/src/Violations Of Best Practice/CodeQL/UnnecessaryUseOfAdvancedConfig.ql

View File

@@ -0,0 +1,23 @@
ql/actions/ql/src/Security/CWE-077/EnvPathInjectionCritical.ql
ql/actions/ql/src/Security/CWE-077/EnvPathInjectionMedium.ql
ql/actions/ql/src/Security/CWE-077/EnvVarInjectionCritical.ql
ql/actions/ql/src/Security/CWE-077/EnvVarInjectionMedium.ql
ql/actions/ql/src/Security/CWE-094/CodeInjectionCritical.ql
ql/actions/ql/src/Security/CWE-094/CodeInjectionMedium.ql
ql/actions/ql/src/Security/CWE-1395/UseOfKnownVulnerableAction.ql
ql/actions/ql/src/Security/CWE-275/MissingActionsPermissions.ql
ql/actions/ql/src/Security/CWE-285/ImproperAccessControl.ql
ql/actions/ql/src/Security/CWE-312/ExcessiveSecretsExposure.ql
ql/actions/ql/src/Security/CWE-312/SecretsInArtifacts.ql
ql/actions/ql/src/Security/CWE-312/UnmaskedSecretExposure.ql
ql/actions/ql/src/Security/CWE-349/CachePoisoningViaCodeInjection.ql
ql/actions/ql/src/Security/CWE-349/CachePoisoningViaDirectCache.ql
ql/actions/ql/src/Security/CWE-349/CachePoisoningViaPoisonableStep.ql
ql/actions/ql/src/Security/CWE-367/UntrustedCheckoutTOCTOUCritical.ql
ql/actions/ql/src/Security/CWE-367/UntrustedCheckoutTOCTOUHigh.ql
ql/actions/ql/src/Security/CWE-829/ArtifactPoisoningCritical.ql
ql/actions/ql/src/Security/CWE-829/ArtifactPoisoningMedium.ql
ql/actions/ql/src/Security/CWE-829/UnpinnedActionsTag.ql
ql/actions/ql/src/Security/CWE-829/UntrustedCheckoutCritical.ql
ql/actions/ql/src/Security/CWE-829/UntrustedCheckoutHigh.ql
ql/actions/ql/src/Security/CWE-829/UntrustedCheckoutMedium.ql

View File

@@ -0,0 +1,11 @@
ql/actions/ql/src/Debug/partial.ql
ql/actions/ql/src/experimental/Security/CWE-074/OutputClobberingHigh.ql
ql/actions/ql/src/experimental/Security/CWE-078/CommandInjectionCritical.ql
ql/actions/ql/src/experimental/Security/CWE-078/CommandInjectionMedium.ql
ql/actions/ql/src/experimental/Security/CWE-088/ArgumentInjectionCritical.ql
ql/actions/ql/src/experimental/Security/CWE-088/ArgumentInjectionMedium.ql
ql/actions/ql/src/experimental/Security/CWE-200/SecretExfiltration.ql
ql/actions/ql/src/experimental/Security/CWE-284/CodeExecutionOnSelfHostedRunner.ql
ql/actions/ql/src/experimental/Security/CWE-829/ArtifactPoisoningPathTraversal.ql
ql/actions/ql/src/experimental/Security/CWE-829/UnversionedImmutableAction.ql
ql/actions/ql/src/experimental/Security/CWE-918/RequestForgery.ql

View File

@@ -0,0 +1,14 @@
import runs_on
import pytest
from query_suites import *
well_known_query_suites = ['actions-code-quality.qls', 'actions-security-and-quality.qls', 'actions-security-extended.qls', 'actions-code-scanning.qls']
@runs_on.posix
@pytest.mark.parametrize("query_suite", well_known_query_suites)
def test(codeql, actions, check_query_suite, query_suite):
check_query_suite(query_suite)
@runs_on.posix
def test_not_included_queries(codeql, actions, check_queries_not_included):
check_queries_not_included('actions', well_known_query_suites)

View File

@@ -0,0 +1,13 @@
ql/csharp/ql/src/API Abuse/FormatInvalid.ql
ql/csharp/ql/src/API Abuse/NoDisposeCallOnLocalIDisposable.ql
ql/csharp/ql/src/Bad Practices/Control-Flow/ConstantCondition.ql
ql/csharp/ql/src/Dead Code/DeadStoreOfLocal.ql
ql/csharp/ql/src/Likely Bugs/Collections/ContainerLengthCmpOffByOne.ql
ql/csharp/ql/src/Likely Bugs/Collections/ContainerSizeCmpZero.ql
ql/csharp/ql/src/Likely Bugs/DangerousNonShortCircuitLogic.ql
ql/csharp/ql/src/Likely Bugs/ReferenceEqualsOnValueTypes.ql
ql/csharp/ql/src/Likely Bugs/SelfAssignment.ql
ql/csharp/ql/src/Likely Bugs/UncheckedCastInEquals.ql
ql/csharp/ql/src/Performance/UseTryGetValue.ql
ql/csharp/ql/src/Useless code/DefaultToString.ql
ql/csharp/ql/src/Useless code/IntGetHashCode.ql

View File

@@ -0,0 +1,57 @@
ql/csharp/ql/src/Diagnostics/CompilerError.ql
ql/csharp/ql/src/Diagnostics/CompilerMessage.ql
ql/csharp/ql/src/Diagnostics/DiagnosticExtractionErrors.ql
ql/csharp/ql/src/Diagnostics/ExtractedFiles.ql
ql/csharp/ql/src/Diagnostics/ExtractorError.ql
ql/csharp/ql/src/Diagnostics/ExtractorMessage.ql
ql/csharp/ql/src/Metrics/Summaries/LinesOfCode.ql
ql/csharp/ql/src/Security Features/CWE-011/ASPNetDebug.ql
ql/csharp/ql/src/Security Features/CWE-016/ASPNetPagesValidateRequest.ql
ql/csharp/ql/src/Security Features/CWE-022/TaintedPath.ql
ql/csharp/ql/src/Security Features/CWE-022/ZipSlip.ql
ql/csharp/ql/src/Security Features/CWE-078/CommandInjection.ql
ql/csharp/ql/src/Security Features/CWE-079/XSS.ql
ql/csharp/ql/src/Security Features/CWE-089/SqlInjection.ql
ql/csharp/ql/src/Security Features/CWE-090/LDAPInjection.ql
ql/csharp/ql/src/Security Features/CWE-091/XMLInjection.ql
ql/csharp/ql/src/Security Features/CWE-094/CodeInjection.ql
ql/csharp/ql/src/Security Features/CWE-099/ResourceInjection.ql
ql/csharp/ql/src/Security Features/CWE-114/AssemblyPathInjection.ql
ql/csharp/ql/src/Security Features/CWE-117/LogForging.ql
ql/csharp/ql/src/Security Features/CWE-119/LocalUnvalidatedArithmetic.ql
ql/csharp/ql/src/Security Features/CWE-134/UncontrolledFormatString.ql
ql/csharp/ql/src/Security Features/CWE-201/ExposureInTransmittedData.ql
ql/csharp/ql/src/Security Features/CWE-209/ExceptionInformationExposure.ql
ql/csharp/ql/src/Security Features/CWE-248/MissingASPNETGlobalErrorHandler.ql
ql/csharp/ql/src/Security Features/CWE-312/CleartextStorage.ql
ql/csharp/ql/src/Security Features/CWE-352/MissingAntiForgeryTokenValidation.ql
ql/csharp/ql/src/Security Features/CWE-359/ExposureOfPrivateInformation.ql
ql/csharp/ql/src/Security Features/CWE-384/AbandonSession.ql
ql/csharp/ql/src/Security Features/CWE-451/MissingXFrameOptions.ql
ql/csharp/ql/src/Security Features/CWE-502/DeserializedDelegate.ql
ql/csharp/ql/src/Security Features/CWE-502/UnsafeDeserializationUntrustedInput.ql
ql/csharp/ql/src/Security Features/CWE-548/ASPNetDirectoryListing.ql
ql/csharp/ql/src/Security Features/CWE-601/UrlRedirect.ql
ql/csharp/ql/src/Security Features/CWE-611/UntrustedDataInsecureXml.ql
ql/csharp/ql/src/Security Features/CWE-614/RequireSSL.ql
ql/csharp/ql/src/Security Features/CWE-643/XPathInjection.ql
ql/csharp/ql/src/Security Features/CWE-730/ReDoS.ql
ql/csharp/ql/src/Security Features/CWE-730/RegexInjection.ql
ql/csharp/ql/src/Security Features/CWE-807/ConditionalBypass.ql
ql/csharp/ql/src/Security Features/CookieWithOverlyBroadDomain.ql
ql/csharp/ql/src/Security Features/CookieWithOverlyBroadPath.ql
ql/csharp/ql/src/Security Features/Encryption using ECB.ql
ql/csharp/ql/src/Security Features/HeaderCheckingDisabled.ql
ql/csharp/ql/src/Security Features/InadequateRSAPadding.ql
ql/csharp/ql/src/Security Features/InsecureRandomness.ql
ql/csharp/ql/src/Security Features/InsufficientKeySize.ql
ql/csharp/ql/src/Security Features/PersistentCookie.ql
ql/csharp/ql/src/Security Features/WeakEncryption.ql
ql/csharp/ql/src/Telemetry/DatabaseQualityDiagnostics.ql
ql/csharp/ql/src/Telemetry/ExternalLibraryUsage.ql
ql/csharp/ql/src/Telemetry/ExtractorInformation.ql
ql/csharp/ql/src/Telemetry/SupportedExternalApis.ql
ql/csharp/ql/src/Telemetry/SupportedExternalSinks.ql
ql/csharp/ql/src/Telemetry/SupportedExternalSources.ql
ql/csharp/ql/src/Telemetry/SupportedExternalTaint.ql
ql/csharp/ql/src/Telemetry/UnsupportedExternalAPIs.ql

View File

@@ -0,0 +1,173 @@
ql/csharp/ql/src/API Abuse/CallToGCCollect.ql
ql/csharp/ql/src/API Abuse/CallToObsoleteMethod.ql
ql/csharp/ql/src/API Abuse/ClassDoesNotImplementEquals.ql
ql/csharp/ql/src/API Abuse/ClassImplementsICloneable.ql
ql/csharp/ql/src/API Abuse/DisposeNotCalledOnException.ql
ql/csharp/ql/src/API Abuse/FormatInvalid.ql
ql/csharp/ql/src/API Abuse/InconsistentEqualsGetHashCode.ql
ql/csharp/ql/src/API Abuse/IncorrectCompareToSignature.ql
ql/csharp/ql/src/API Abuse/IncorrectEqualsSignature.ql
ql/csharp/ql/src/API Abuse/NoDisposeCallOnLocalIDisposable.ql
ql/csharp/ql/src/API Abuse/NullArgumentToEquals.ql
ql/csharp/ql/src/ASP/BlockCodeResponseWrite.ql
ql/csharp/ql/src/Architecture/Refactoring Opportunities/InappropriateIntimacy.ql
ql/csharp/ql/src/Bad Practices/CallsUnmanagedCode.ql
ql/csharp/ql/src/Bad Practices/CatchOfNullReferenceException.ql
ql/csharp/ql/src/Bad Practices/Control-Flow/ConstantCondition.ql
ql/csharp/ql/src/Bad Practices/Declarations/LocalScopeVariableShadowsMember.ql
ql/csharp/ql/src/Bad Practices/Declarations/TooManyRefParameters.ql
ql/csharp/ql/src/Bad Practices/EmptyCatchBlock.ql
ql/csharp/ql/src/Bad Practices/ErroneousClassCompare.ql
ql/csharp/ql/src/Bad Practices/Implementation Hiding/AbstractToConcreteCollection.ql
ql/csharp/ql/src/Bad Practices/Implementation Hiding/ExposeRepresentation.ql
ql/csharp/ql/src/Bad Practices/Naming Conventions/FieldMasksSuperField.ql
ql/csharp/ql/src/Bad Practices/Naming Conventions/SameNameAsSuper.ql
ql/csharp/ql/src/Bad Practices/PathCombine.ql
ql/csharp/ql/src/Bad Practices/UnmanagedCodeCheck.ql
ql/csharp/ql/src/Bad Practices/VirtualCallInConstructorOrDestructor.ql
ql/csharp/ql/src/CSI/CompareIdenticalValues.ql
ql/csharp/ql/src/CSI/NullAlways.ql
ql/csharp/ql/src/CSI/NullMaybe.ql
ql/csharp/ql/src/Complexity/BlockWithTooManyStatements.ql
ql/csharp/ql/src/Complexity/ComplexCondition.ql
ql/csharp/ql/src/Concurrency/FutileSyncOnField.ql
ql/csharp/ql/src/Concurrency/LockOrder.ql
ql/csharp/ql/src/Concurrency/LockThis.ql
ql/csharp/ql/src/Concurrency/LockedWait.ql
ql/csharp/ql/src/Concurrency/SynchSetUnsynchGet.ql
ql/csharp/ql/src/Concurrency/UnsafeLazyInitialization.ql
ql/csharp/ql/src/Concurrency/UnsynchronizedStaticAccess.ql
ql/csharp/ql/src/Configuration/EmptyPasswordInConfigurationFile.ql
ql/csharp/ql/src/Configuration/PasswordInConfigurationFile.ql
ql/csharp/ql/src/Dead Code/DeadStoreOfLocal.ql
ql/csharp/ql/src/Diagnostics/CompilerError.ql
ql/csharp/ql/src/Diagnostics/CompilerMessage.ql
ql/csharp/ql/src/Diagnostics/DiagnosticExtractionErrors.ql
ql/csharp/ql/src/Diagnostics/ExtractedFiles.ql
ql/csharp/ql/src/Diagnostics/ExtractorError.ql
ql/csharp/ql/src/Diagnostics/ExtractorMessage.ql
ql/csharp/ql/src/Documentation/XmldocMissingSummary.ql
ql/csharp/ql/src/Input Validation/UseOfFileUpload.ql
ql/csharp/ql/src/Input Validation/ValueShadowing.ql
ql/csharp/ql/src/Input Validation/ValueShadowingServerVariable.ql
ql/csharp/ql/src/Language Abuse/CastThisToTypeParameter.ql
ql/csharp/ql/src/Language Abuse/CatchOfGenericException.ql
ql/csharp/ql/src/Language Abuse/ChainedIs.ql
ql/csharp/ql/src/Language Abuse/DubiousDowncastOfThis.ql
ql/csharp/ql/src/Language Abuse/DubiousTypeTestOfThis.ql
ql/csharp/ql/src/Language Abuse/MissedReadonlyOpportunity.ql
ql/csharp/ql/src/Language Abuse/MissedTernaryOpportunity.ql
ql/csharp/ql/src/Language Abuse/MissedUsingOpportunity.ql
ql/csharp/ql/src/Language Abuse/NestedIf.ql
ql/csharp/ql/src/Language Abuse/RethrowException.ql
ql/csharp/ql/src/Language Abuse/SimplifyBoolExpr.ql
ql/csharp/ql/src/Language Abuse/UnusedPropertyValue.ql
ql/csharp/ql/src/Language Abuse/UselessCastToSelf.ql
ql/csharp/ql/src/Language Abuse/UselessNullCoalescingExpression.ql
ql/csharp/ql/src/Language Abuse/UselessTypeTest.ql
ql/csharp/ql/src/Language Abuse/UselessUpcast.ql
ql/csharp/ql/src/Likely Bugs/Collections/ContainerLengthCmpOffByOne.ql
ql/csharp/ql/src/Likely Bugs/Collections/ContainerSizeCmpZero.ql
ql/csharp/ql/src/Likely Bugs/Collections/ReadOnlyContainer.ql
ql/csharp/ql/src/Likely Bugs/Collections/WriteOnlyContainer.ql
ql/csharp/ql/src/Likely Bugs/ConstantComparison.ql
ql/csharp/ql/src/Likely Bugs/DangerousNonShortCircuitLogic.ql
ql/csharp/ql/src/Likely Bugs/Dynamic/BadDynamicCall.ql
ql/csharp/ql/src/Likely Bugs/EqualityCheckOnFloats.ql
ql/csharp/ql/src/Likely Bugs/EqualsArray.ql
ql/csharp/ql/src/Likely Bugs/EqualsUsesAs.ql
ql/csharp/ql/src/Likely Bugs/EqualsUsesIs.ql
ql/csharp/ql/src/Likely Bugs/HashedButNoHash.ql
ql/csharp/ql/src/Likely Bugs/ImpossibleArrayCast.ql
ql/csharp/ql/src/Likely Bugs/IncomparableEquals.ql
ql/csharp/ql/src/Likely Bugs/InconsistentCompareTo.ql
ql/csharp/ql/src/Likely Bugs/LeapYear/UnsafeYearConstruction.ql
ql/csharp/ql/src/Likely Bugs/MishandlingJapaneseEra.ql
ql/csharp/ql/src/Likely Bugs/NestedLoopsSameVariable.ql
ql/csharp/ql/src/Likely Bugs/ObjectComparison.ql
ql/csharp/ql/src/Likely Bugs/PossibleLossOfPrecision.ql
ql/csharp/ql/src/Likely Bugs/RecursiveEquals.ql
ql/csharp/ql/src/Likely Bugs/RecursiveOperatorEquals.ql
ql/csharp/ql/src/Likely Bugs/ReferenceEqualsOnValueTypes.ql
ql/csharp/ql/src/Likely Bugs/SelfAssignment.ql
ql/csharp/ql/src/Likely Bugs/Statements/EmptyBlock.ql
ql/csharp/ql/src/Likely Bugs/Statements/EmptyLockStatement.ql
ql/csharp/ql/src/Likely Bugs/Statements/UseBraces.ql
ql/csharp/ql/src/Likely Bugs/StaticFieldWrittenByInstance.ql
ql/csharp/ql/src/Likely Bugs/StringBuilderCharInit.ql
ql/csharp/ql/src/Likely Bugs/ThreadUnsafeICryptoTransform.ql
ql/csharp/ql/src/Likely Bugs/ThreadUnsafeICryptoTransformLambda.ql
ql/csharp/ql/src/Likely Bugs/UncheckedCastInEquals.ql
ql/csharp/ql/src/Linq/BadMultipleIteration.ql
ql/csharp/ql/src/Linq/MissedAllOpportunity.ql
ql/csharp/ql/src/Linq/MissedCastOpportunity.ql
ql/csharp/ql/src/Linq/MissedOfTypeOpportunity.ql
ql/csharp/ql/src/Linq/MissedSelectOpportunity.ql
ql/csharp/ql/src/Linq/MissedWhereOpportunity.ql
ql/csharp/ql/src/Linq/RedundantSelect.ql
ql/csharp/ql/src/Metrics/Summaries/LinesOfCode.ql
ql/csharp/ql/src/Performance/StringBuilderInLoop.ql
ql/csharp/ql/src/Performance/StringConcatenationInLoop.ql
ql/csharp/ql/src/Performance/UseTryGetValue.ql
ql/csharp/ql/src/Security Features/CWE-011/ASPNetDebug.ql
ql/csharp/ql/src/Security Features/CWE-016/ASPNetPagesValidateRequest.ql
ql/csharp/ql/src/Security Features/CWE-020/RuntimeChecksBypass.ql
ql/csharp/ql/src/Security Features/CWE-022/TaintedPath.ql
ql/csharp/ql/src/Security Features/CWE-022/ZipSlip.ql
ql/csharp/ql/src/Security Features/CWE-078/CommandInjection.ql
ql/csharp/ql/src/Security Features/CWE-079/XSS.ql
ql/csharp/ql/src/Security Features/CWE-089/SqlInjection.ql
ql/csharp/ql/src/Security Features/CWE-090/LDAPInjection.ql
ql/csharp/ql/src/Security Features/CWE-091/XMLInjection.ql
ql/csharp/ql/src/Security Features/CWE-094/CodeInjection.ql
ql/csharp/ql/src/Security Features/CWE-099/ResourceInjection.ql
ql/csharp/ql/src/Security Features/CWE-112/MissingXMLValidation.ql
ql/csharp/ql/src/Security Features/CWE-114/AssemblyPathInjection.ql
ql/csharp/ql/src/Security Features/CWE-117/LogForging.ql
ql/csharp/ql/src/Security Features/CWE-119/LocalUnvalidatedArithmetic.ql
ql/csharp/ql/src/Security Features/CWE-134/UncontrolledFormatString.ql
ql/csharp/ql/src/Security Features/CWE-201/ExposureInTransmittedData.ql
ql/csharp/ql/src/Security Features/CWE-209/ExceptionInformationExposure.ql
ql/csharp/ql/src/Security Features/CWE-248/MissingASPNETGlobalErrorHandler.ql
ql/csharp/ql/src/Security Features/CWE-285/MissingAccessControl.ql
ql/csharp/ql/src/Security Features/CWE-312/CleartextStorage.ql
ql/csharp/ql/src/Security Features/CWE-327/InsecureSQLConnection.ql
ql/csharp/ql/src/Security Features/CWE-352/MissingAntiForgeryTokenValidation.ql
ql/csharp/ql/src/Security Features/CWE-359/ExposureOfPrivateInformation.ql
ql/csharp/ql/src/Security Features/CWE-384/AbandonSession.ql
ql/csharp/ql/src/Security Features/CWE-451/MissingXFrameOptions.ql
ql/csharp/ql/src/Security Features/CWE-502/DeserializedDelegate.ql
ql/csharp/ql/src/Security Features/CWE-502/UnsafeDeserializationUntrustedInput.ql
ql/csharp/ql/src/Security Features/CWE-548/ASPNetDirectoryListing.ql
ql/csharp/ql/src/Security Features/CWE-601/UrlRedirect.ql
ql/csharp/ql/src/Security Features/CWE-611/UntrustedDataInsecureXml.ql
ql/csharp/ql/src/Security Features/CWE-614/RequireSSL.ql
ql/csharp/ql/src/Security Features/CWE-639/InsecureDirectObjectReference.ql
ql/csharp/ql/src/Security Features/CWE-643/XPathInjection.ql
ql/csharp/ql/src/Security Features/CWE-730/ReDoS.ql
ql/csharp/ql/src/Security Features/CWE-730/RegexInjection.ql
ql/csharp/ql/src/Security Features/CWE-798/HardcodedConnectionString.ql
ql/csharp/ql/src/Security Features/CWE-798/HardcodedCredentials.ql
ql/csharp/ql/src/Security Features/CWE-807/ConditionalBypass.ql
ql/csharp/ql/src/Security Features/CookieWithOverlyBroadDomain.ql
ql/csharp/ql/src/Security Features/CookieWithOverlyBroadPath.ql
ql/csharp/ql/src/Security Features/Encryption using ECB.ql
ql/csharp/ql/src/Security Features/HeaderCheckingDisabled.ql
ql/csharp/ql/src/Security Features/InadequateRSAPadding.ql
ql/csharp/ql/src/Security Features/InsecureRandomness.ql
ql/csharp/ql/src/Security Features/InsufficientKeySize.ql
ql/csharp/ql/src/Security Features/PersistentCookie.ql
ql/csharp/ql/src/Security Features/WeakEncryption.ql
ql/csharp/ql/src/Telemetry/DatabaseQualityDiagnostics.ql
ql/csharp/ql/src/Telemetry/ExternalLibraryUsage.ql
ql/csharp/ql/src/Telemetry/ExtractorInformation.ql
ql/csharp/ql/src/Telemetry/SupportedExternalApis.ql
ql/csharp/ql/src/Telemetry/SupportedExternalSinks.ql
ql/csharp/ql/src/Telemetry/SupportedExternalSources.ql
ql/csharp/ql/src/Telemetry/SupportedExternalTaint.ql
ql/csharp/ql/src/Telemetry/UnsupportedExternalAPIs.ql
ql/csharp/ql/src/Useless code/DefaultToString.ql
ql/csharp/ql/src/Useless code/FutileConditional.ql
ql/csharp/ql/src/Useless code/IntGetHashCode.ql
ql/csharp/ql/src/Useless code/RedundantToStringCall.ql
ql/csharp/ql/src/Useless code/UnusedLabel.ql

View File

@@ -0,0 +1,71 @@
ql/csharp/ql/src/Configuration/EmptyPasswordInConfigurationFile.ql
ql/csharp/ql/src/Configuration/PasswordInConfigurationFile.ql
ql/csharp/ql/src/Diagnostics/CompilerError.ql
ql/csharp/ql/src/Diagnostics/CompilerMessage.ql
ql/csharp/ql/src/Diagnostics/DiagnosticExtractionErrors.ql
ql/csharp/ql/src/Diagnostics/ExtractedFiles.ql
ql/csharp/ql/src/Diagnostics/ExtractorError.ql
ql/csharp/ql/src/Diagnostics/ExtractorMessage.ql
ql/csharp/ql/src/Input Validation/UseOfFileUpload.ql
ql/csharp/ql/src/Input Validation/ValueShadowing.ql
ql/csharp/ql/src/Input Validation/ValueShadowingServerVariable.ql
ql/csharp/ql/src/Likely Bugs/ThreadUnsafeICryptoTransform.ql
ql/csharp/ql/src/Likely Bugs/ThreadUnsafeICryptoTransformLambda.ql
ql/csharp/ql/src/Metrics/Summaries/LinesOfCode.ql
ql/csharp/ql/src/Security Features/CWE-011/ASPNetDebug.ql
ql/csharp/ql/src/Security Features/CWE-016/ASPNetPagesValidateRequest.ql
ql/csharp/ql/src/Security Features/CWE-020/RuntimeChecksBypass.ql
ql/csharp/ql/src/Security Features/CWE-022/TaintedPath.ql
ql/csharp/ql/src/Security Features/CWE-022/ZipSlip.ql
ql/csharp/ql/src/Security Features/CWE-078/CommandInjection.ql
ql/csharp/ql/src/Security Features/CWE-079/XSS.ql
ql/csharp/ql/src/Security Features/CWE-089/SqlInjection.ql
ql/csharp/ql/src/Security Features/CWE-090/LDAPInjection.ql
ql/csharp/ql/src/Security Features/CWE-091/XMLInjection.ql
ql/csharp/ql/src/Security Features/CWE-094/CodeInjection.ql
ql/csharp/ql/src/Security Features/CWE-099/ResourceInjection.ql
ql/csharp/ql/src/Security Features/CWE-112/MissingXMLValidation.ql
ql/csharp/ql/src/Security Features/CWE-114/AssemblyPathInjection.ql
ql/csharp/ql/src/Security Features/CWE-117/LogForging.ql
ql/csharp/ql/src/Security Features/CWE-119/LocalUnvalidatedArithmetic.ql
ql/csharp/ql/src/Security Features/CWE-134/UncontrolledFormatString.ql
ql/csharp/ql/src/Security Features/CWE-201/ExposureInTransmittedData.ql
ql/csharp/ql/src/Security Features/CWE-209/ExceptionInformationExposure.ql
ql/csharp/ql/src/Security Features/CWE-248/MissingASPNETGlobalErrorHandler.ql
ql/csharp/ql/src/Security Features/CWE-285/MissingAccessControl.ql
ql/csharp/ql/src/Security Features/CWE-312/CleartextStorage.ql
ql/csharp/ql/src/Security Features/CWE-327/InsecureSQLConnection.ql
ql/csharp/ql/src/Security Features/CWE-352/MissingAntiForgeryTokenValidation.ql
ql/csharp/ql/src/Security Features/CWE-359/ExposureOfPrivateInformation.ql
ql/csharp/ql/src/Security Features/CWE-384/AbandonSession.ql
ql/csharp/ql/src/Security Features/CWE-451/MissingXFrameOptions.ql
ql/csharp/ql/src/Security Features/CWE-502/DeserializedDelegate.ql
ql/csharp/ql/src/Security Features/CWE-502/UnsafeDeserializationUntrustedInput.ql
ql/csharp/ql/src/Security Features/CWE-548/ASPNetDirectoryListing.ql
ql/csharp/ql/src/Security Features/CWE-601/UrlRedirect.ql
ql/csharp/ql/src/Security Features/CWE-611/UntrustedDataInsecureXml.ql
ql/csharp/ql/src/Security Features/CWE-614/RequireSSL.ql
ql/csharp/ql/src/Security Features/CWE-639/InsecureDirectObjectReference.ql
ql/csharp/ql/src/Security Features/CWE-643/XPathInjection.ql
ql/csharp/ql/src/Security Features/CWE-730/ReDoS.ql
ql/csharp/ql/src/Security Features/CWE-730/RegexInjection.ql
ql/csharp/ql/src/Security Features/CWE-798/HardcodedConnectionString.ql
ql/csharp/ql/src/Security Features/CWE-798/HardcodedCredentials.ql
ql/csharp/ql/src/Security Features/CWE-807/ConditionalBypass.ql
ql/csharp/ql/src/Security Features/CookieWithOverlyBroadDomain.ql
ql/csharp/ql/src/Security Features/CookieWithOverlyBroadPath.ql
ql/csharp/ql/src/Security Features/Encryption using ECB.ql
ql/csharp/ql/src/Security Features/HeaderCheckingDisabled.ql
ql/csharp/ql/src/Security Features/InadequateRSAPadding.ql
ql/csharp/ql/src/Security Features/InsecureRandomness.ql
ql/csharp/ql/src/Security Features/InsufficientKeySize.ql
ql/csharp/ql/src/Security Features/PersistentCookie.ql
ql/csharp/ql/src/Security Features/WeakEncryption.ql
ql/csharp/ql/src/Telemetry/DatabaseQualityDiagnostics.ql
ql/csharp/ql/src/Telemetry/ExternalLibraryUsage.ql
ql/csharp/ql/src/Telemetry/ExtractorInformation.ql
ql/csharp/ql/src/Telemetry/SupportedExternalApis.ql
ql/csharp/ql/src/Telemetry/SupportedExternalSinks.ql
ql/csharp/ql/src/Telemetry/SupportedExternalSources.ql
ql/csharp/ql/src/Telemetry/SupportedExternalTaint.ql
ql/csharp/ql/src/Telemetry/UnsupportedExternalAPIs.ql

View File

@@ -0,0 +1,128 @@
ql/csharp/ql/src/API Abuse/MissingDisposeCall.ql
ql/csharp/ql/src/API Abuse/MissingDisposeMethod.ql
ql/csharp/ql/src/API Abuse/NonOverridingMethod.ql
ql/csharp/ql/src/API Abuse/UncheckedReturnValue.ql
ql/csharp/ql/src/ASP/ComplexInlineCode.ql
ql/csharp/ql/src/ASP/NonInternationalizedText.ql
ql/csharp/ql/src/ASP/SplitControlStructure.ql
ql/csharp/ql/src/AlertSuppression.ql
ql/csharp/ql/src/Architecture/Dependencies/MutualDependency.ql
ql/csharp/ql/src/Architecture/Refactoring Opportunities/FeatureEnvy.ql
ql/csharp/ql/src/Bad Practices/Comments/CommentedOutCode.ql
ql/csharp/ql/src/Bad Practices/Comments/TodoComments.ql
ql/csharp/ql/src/Bad Practices/Declarations/EmptyInterface.ql
ql/csharp/ql/src/Bad Practices/Declarations/NoConstantsOnly.ql
ql/csharp/ql/src/Bad Practices/Implementation Hiding/StaticArray.ql
ql/csharp/ql/src/Bad Practices/LeftoverDebugCode.ql
ql/csharp/ql/src/Bad Practices/Magic Constants/MagicConstantsNumbers.ql
ql/csharp/ql/src/Bad Practices/Magic Constants/MagicConstantsString.ql
ql/csharp/ql/src/Bad Practices/Magic Constants/MagicNumbersUseConstant.ql
ql/csharp/ql/src/Bad Practices/Magic Constants/MagicStringsUseConstant.ql
ql/csharp/ql/src/Bad Practices/Naming Conventions/ConfusingMethodNames.ql
ql/csharp/ql/src/Bad Practices/Naming Conventions/ConfusingOverridesNames.ql
ql/csharp/ql/src/Bad Practices/Naming Conventions/ConstantNaming.ql
ql/csharp/ql/src/Bad Practices/Naming Conventions/ControlNamePrefixes.ql
ql/csharp/ql/src/Bad Practices/Naming Conventions/DefaultControlNames.ql
ql/csharp/ql/src/Bad Practices/Naming Conventions/VariableNameTooShort.ql
ql/csharp/ql/src/Bad Practices/UseOfHtmlInputHidden.ql
ql/csharp/ql/src/Bad Practices/UseOfSystemOutputStream.ql
ql/csharp/ql/src/Dead Code/DeadRefTypes.ql
ql/csharp/ql/src/Dead Code/NonAssignedFields.ql
ql/csharp/ql/src/Dead Code/UnusedField.ql
ql/csharp/ql/src/Dead Code/UnusedMethod.ql
ql/csharp/ql/src/Documentation/XmldocExtraParam.ql
ql/csharp/ql/src/Documentation/XmldocExtraTypeParam.ql
ql/csharp/ql/src/Documentation/XmldocMissing.ql
ql/csharp/ql/src/Documentation/XmldocMissingException.ql
ql/csharp/ql/src/Documentation/XmldocMissingParam.ql
ql/csharp/ql/src/Documentation/XmldocMissingReturn.ql
ql/csharp/ql/src/Documentation/XmldocMissingTypeParam.ql
ql/csharp/ql/src/Language Abuse/ForeachCapture.ql
ql/csharp/ql/src/Language Abuse/UselessIsBeforeAs.ql
ql/csharp/ql/src/Likely Bugs/BadCheckOdd.ql
ql/csharp/ql/src/Likely Bugs/RandomUsedOnce.ql
ql/csharp/ql/src/Metrics/Callables/CCyclomaticComplexity.ql
ql/csharp/ql/src/Metrics/Callables/CLinesOfCode.ql
ql/csharp/ql/src/Metrics/Callables/CLinesOfComment.ql
ql/csharp/ql/src/Metrics/Callables/CNumberOfParameters.ql
ql/csharp/ql/src/Metrics/Callables/CNumberOfStatements.ql
ql/csharp/ql/src/Metrics/Callables/CPercentageOfComments.ql
ql/csharp/ql/src/Metrics/Callables/StatementNestingDepth.ql
ql/csharp/ql/src/Metrics/Dependencies/ExternalDependencies.ql
ql/csharp/ql/src/Metrics/Dependencies/ExternalDependenciesSourceLinks.ql
ql/csharp/ql/src/Metrics/Files/FCommentRatio.ql
ql/csharp/ql/src/Metrics/Files/FCyclomaticComplexity.ql
ql/csharp/ql/src/Metrics/Files/FLines.ql
ql/csharp/ql/src/Metrics/Files/FLinesOfCode.ql
ql/csharp/ql/src/Metrics/Files/FLinesOfComment.ql
ql/csharp/ql/src/Metrics/Files/FLinesOfCommentedCode.ql
ql/csharp/ql/src/Metrics/Files/FNumberOfClasses.ql
ql/csharp/ql/src/Metrics/Files/FNumberOfInterfaces.ql
ql/csharp/ql/src/Metrics/Files/FNumberOfStructs.ql
ql/csharp/ql/src/Metrics/Files/FNumberOfTests.ql
ql/csharp/ql/src/Metrics/Files/FNumberOfUsingNamespaces.ql
ql/csharp/ql/src/Metrics/Files/FSelfContainedness.ql
ql/csharp/ql/src/Metrics/RefTypes/TAfferentCoupling.ql
ql/csharp/ql/src/Metrics/RefTypes/TEfferentCoupling.ql
ql/csharp/ql/src/Metrics/RefTypes/TInheritanceDepth.ql
ql/csharp/ql/src/Metrics/RefTypes/TLackOfCohesionCK.ql
ql/csharp/ql/src/Metrics/RefTypes/TLackOfCohesionHS.ql
ql/csharp/ql/src/Metrics/RefTypes/TNumberOfCallables.ql
ql/csharp/ql/src/Metrics/RefTypes/TNumberOfEvents.ql
ql/csharp/ql/src/Metrics/RefTypes/TNumberOfFields.ql
ql/csharp/ql/src/Metrics/RefTypes/TNumberOfIndexers.ql
ql/csharp/ql/src/Metrics/RefTypes/TNumberOfNonConstFields.ql
ql/csharp/ql/src/Metrics/RefTypes/TNumberOfProperties.ql
ql/csharp/ql/src/Metrics/RefTypes/TNumberOfStatements.ql
ql/csharp/ql/src/Metrics/RefTypes/TResponse.ql
ql/csharp/ql/src/Metrics/RefTypes/TSizeOfAPI.ql
ql/csharp/ql/src/Metrics/RefTypes/TSpecialisationIndex.ql
ql/csharp/ql/src/Metrics/RefTypes/TUnmanagedCode.ql
ql/csharp/ql/src/Metrics/Summaries/FrameworkCoverage.ql
ql/csharp/ql/src/Metrics/internal/ExtractorDiagnostics.ql
ql/csharp/ql/src/Security Features/CWE-016/ASPNetMaxRequestLength.ql
ql/csharp/ql/src/Security Features/CWE-016/ASPNetRequestValidationMode.ql
ql/csharp/ql/src/Security Features/CWE-020/ExternalAPIsUsedWithUntrustedData.ql
ql/csharp/ql/src/Security Features/CWE-020/UntrustedDataToExternalAPI.ql
ql/csharp/ql/src/Security Features/CWE-321/HardcodedEncryptionKey.ql
ql/csharp/ql/src/Security Features/CWE-321/HardcodedSymmetricEncryptionKey.ql
ql/csharp/ql/src/Security Features/CWE-327/DontInstallRootCert.ql
ql/csharp/ql/src/Security Features/CWE-502/UnsafeDeserialization.ql
ql/csharp/ql/src/Security Features/CWE-611/UseXmlSecureResolver.ql
ql/csharp/ql/src/Security Features/CWE-838/InappropriateEncoding.ql
ql/csharp/ql/src/Useless code/PointlessForwardingMethod.ql
ql/csharp/ql/src/definitions.ql
ql/csharp/ql/src/experimental/CWE-099/TaintedWebClient.ql
ql/csharp/ql/src/experimental/CWE-918/RequestForgery.ql
ql/csharp/ql/src/experimental/Security Features/CWE-1004/CookieWithoutHttpOnly.ql
ql/csharp/ql/src/experimental/Security Features/CWE-327/Azure/UnsafeUsageOfClientSideEncryptionVersion.ql
ql/csharp/ql/src/experimental/Security Features/CWE-614/CookieWithoutSecure.ql
ql/csharp/ql/src/experimental/Security Features/CWE-759/HashWithoutSalt.ql
ql/csharp/ql/src/experimental/Security Features/JsonWebTokenHandler/delegated-security-validations-always-return-true.ql
ql/csharp/ql/src/experimental/Security Features/JsonWebTokenHandler/security-validation-disabled.ql
ql/csharp/ql/src/experimental/Security Features/Serialization/DefiningDatasetRelatedType.ql
ql/csharp/ql/src/experimental/Security Features/Serialization/DefiningPotentiallyUnsafeXmlSerializer.ql
ql/csharp/ql/src/experimental/Security Features/Serialization/UnsafeTypeUsedDataContractSerializer.ql
ql/csharp/ql/src/experimental/Security Features/Serialization/XmlDeserializationWithDataSet.ql
ql/csharp/ql/src/experimental/Security Features/backdoor/DangerousNativeFunctionCall.ql
ql/csharp/ql/src/experimental/Security Features/backdoor/PotentialTimeBomb.ql
ql/csharp/ql/src/experimental/Security Features/backdoor/ProcessNameToHashTaintFlow.ql
ql/csharp/ql/src/filters/ClassifyFiles.ql
ql/csharp/ql/src/meta/frameworks/Coverage.ql
ql/csharp/ql/src/meta/frameworks/UnsupportedExternalAPIs.ql
ql/csharp/ql/src/utils/modelconverter/ExtractNeutrals.ql
ql/csharp/ql/src/utils/modelconverter/ExtractSinks.ql
ql/csharp/ql/src/utils/modelconverter/ExtractSources.ql
ql/csharp/ql/src/utils/modelconverter/ExtractSummaries.ql
ql/csharp/ql/src/utils/modeleditor/ApplicationModeEndpoints.ql
ql/csharp/ql/src/utils/modeleditor/FrameworkModeEndpoints.ql
ql/csharp/ql/src/utils/modelgenerator/CaptureContentSummaryModels.ql
ql/csharp/ql/src/utils/modelgenerator/CaptureMixedNeutralModels.ql
ql/csharp/ql/src/utils/modelgenerator/CaptureMixedSummaryModels.ql
ql/csharp/ql/src/utils/modelgenerator/CaptureNeutralModels.ql
ql/csharp/ql/src/utils/modelgenerator/CaptureSinkModels.ql
ql/csharp/ql/src/utils/modelgenerator/CaptureSourceModels.ql
ql/csharp/ql/src/utils/modelgenerator/CaptureSummaryModels.ql
ql/csharp/ql/src/utils/modelgenerator/CaptureTypeBasedSummaryModels.ql
ql/csharp/ql/src/utils/modelgenerator/debug/CaptureSummaryModelsPartialPath.ql
ql/csharp/ql/src/utils/modelgenerator/debug/CaptureSummaryModelsPath.ql

View File

@@ -0,0 +1,14 @@
import runs_on
import pytest
from query_suites import *
well_known_query_suites = ['csharp-code-quality.qls', 'csharp-security-and-quality.qls', 'csharp-security-extended.qls', 'csharp-code-scanning.qls']
@runs_on.posix
@pytest.mark.parametrize("query_suite", well_known_query_suites)
def test(codeql, csharp, check_query_suite, query_suite):
check_query_suite(query_suite)
@runs_on.posix
def test_not_included_queries(codeql, csharp, check_queries_not_included):
check_queries_not_included('csharp', well_known_query_suites)

View File

@@ -0,0 +1,6 @@
ql/go/ql/src/InconsistentCode/LengthComparisonOffByOne.ql
ql/go/ql/src/InconsistentCode/MissingErrorCheck.ql
ql/go/ql/src/InconsistentCode/UnhandledCloseWritableHandle.ql
ql/go/ql/src/InconsistentCode/WrappedErrorAlwaysNil.ql
ql/go/ql/src/RedundantCode/NegativeLengthCheck.ql
ql/go/ql/src/RedundantCode/RedundantRecover.ql

View File

@@ -0,0 +1,31 @@
ql/go/ql/src/Diagnostics/ExtractionErrors.ql
ql/go/ql/src/Diagnostics/SuccessfullyExtractedFiles.ql
ql/go/ql/src/Security/CWE-020/IncompleteHostnameRegexp.ql
ql/go/ql/src/Security/CWE-020/IncompleteUrlSchemeCheck.ql
ql/go/ql/src/Security/CWE-020/MissingRegexpAnchor.ql
ql/go/ql/src/Security/CWE-020/SuspiciousCharacterInRegexp.ql
ql/go/ql/src/Security/CWE-022/TaintedPath.ql
ql/go/ql/src/Security/CWE-022/UnsafeUnzipSymlink.ql
ql/go/ql/src/Security/CWE-022/ZipSlip.ql
ql/go/ql/src/Security/CWE-078/CommandInjection.ql
ql/go/ql/src/Security/CWE-079/ReflectedXss.ql
ql/go/ql/src/Security/CWE-089/SqlInjection.ql
ql/go/ql/src/Security/CWE-089/StringBreak.ql
ql/go/ql/src/Security/CWE-190/AllocationSizeOverflow.ql
ql/go/ql/src/Security/CWE-209/StackTraceExposure.ql
ql/go/ql/src/Security/CWE-295/DisabledCertificateCheck.ql
ql/go/ql/src/Security/CWE-312/CleartextLogging.ql
ql/go/ql/src/Security/CWE-322/InsecureHostKeyCallback.ql
ql/go/ql/src/Security/CWE-326/InsufficientKeySize.ql
ql/go/ql/src/Security/CWE-327/InsecureTLS.ql
ql/go/ql/src/Security/CWE-338/InsecureRandomness.ql
ql/go/ql/src/Security/CWE-347/MissingJwtSignatureCheck.ql
ql/go/ql/src/Security/CWE-352/ConstantOauth2State.ql
ql/go/ql/src/Security/CWE-601/BadRedirectCheck.ql
ql/go/ql/src/Security/CWE-601/OpenUrlRedirect.ql
ql/go/ql/src/Security/CWE-640/EmailInjection.ql
ql/go/ql/src/Security/CWE-643/XPathInjection.ql
ql/go/ql/src/Security/CWE-681/IncorrectIntegerConversionQuery.ql
ql/go/ql/src/Security/CWE-770/UncontrolledAllocationSize.ql
ql/go/ql/src/Security/CWE-918/RequestForgery.ql
ql/go/ql/src/Summary/LinesOfCode.ql

View File

@@ -0,0 +1,55 @@
ql/go/ql/src/Diagnostics/ExtractionErrors.ql
ql/go/ql/src/Diagnostics/SuccessfullyExtractedFiles.ql
ql/go/ql/src/InconsistentCode/ConstantLengthComparison.ql
ql/go/ql/src/InconsistentCode/InconsistentLoopOrientation.ql
ql/go/ql/src/InconsistentCode/LengthComparisonOffByOne.ql
ql/go/ql/src/InconsistentCode/MissingErrorCheck.ql
ql/go/ql/src/InconsistentCode/MistypedExponentiation.ql
ql/go/ql/src/InconsistentCode/UnhandledCloseWritableHandle.ql
ql/go/ql/src/InconsistentCode/WhitespaceContradictsPrecedence.ql
ql/go/ql/src/InconsistentCode/WrappedErrorAlwaysNil.ql
ql/go/ql/src/RedundantCode/CompareIdenticalValues.ql
ql/go/ql/src/RedundantCode/DeadStoreOfField.ql
ql/go/ql/src/RedundantCode/DeadStoreOfLocal.ql
ql/go/ql/src/RedundantCode/DuplicateBranches.ql
ql/go/ql/src/RedundantCode/DuplicateCondition.ql
ql/go/ql/src/RedundantCode/DuplicateSwitchCase.ql
ql/go/ql/src/RedundantCode/ExprHasNoEffect.ql
ql/go/ql/src/RedundantCode/ImpossibleInterfaceNilCheck.ql
ql/go/ql/src/RedundantCode/NegativeLengthCheck.ql
ql/go/ql/src/RedundantCode/RedundantExpr.ql
ql/go/ql/src/RedundantCode/RedundantRecover.ql
ql/go/ql/src/RedundantCode/SelfAssignment.ql
ql/go/ql/src/RedundantCode/ShiftOutOfRange.ql
ql/go/ql/src/RedundantCode/UnreachableStatement.ql
ql/go/ql/src/Security/CWE-020/IncompleteHostnameRegexp.ql
ql/go/ql/src/Security/CWE-020/IncompleteUrlSchemeCheck.ql
ql/go/ql/src/Security/CWE-020/MissingRegexpAnchor.ql
ql/go/ql/src/Security/CWE-020/SuspiciousCharacterInRegexp.ql
ql/go/ql/src/Security/CWE-022/TaintedPath.ql
ql/go/ql/src/Security/CWE-022/UnsafeUnzipSymlink.ql
ql/go/ql/src/Security/CWE-022/ZipSlip.ql
ql/go/ql/src/Security/CWE-078/CommandInjection.ql
ql/go/ql/src/Security/CWE-079/ReflectedXss.ql
ql/go/ql/src/Security/CWE-089/SqlInjection.ql
ql/go/ql/src/Security/CWE-089/StringBreak.ql
ql/go/ql/src/Security/CWE-117/LogInjection.ql
ql/go/ql/src/Security/CWE-190/AllocationSizeOverflow.ql
ql/go/ql/src/Security/CWE-209/StackTraceExposure.ql
ql/go/ql/src/Security/CWE-295/DisabledCertificateCheck.ql
ql/go/ql/src/Security/CWE-312/CleartextLogging.ql
ql/go/ql/src/Security/CWE-322/InsecureHostKeyCallback.ql
ql/go/ql/src/Security/CWE-326/InsufficientKeySize.ql
ql/go/ql/src/Security/CWE-327/InsecureTLS.ql
ql/go/ql/src/Security/CWE-338/InsecureRandomness.ql
ql/go/ql/src/Security/CWE-347/MissingJwtSignatureCheck.ql
ql/go/ql/src/Security/CWE-352/ConstantOauth2State.ql
ql/go/ql/src/Security/CWE-601/BadRedirectCheck.ql
ql/go/ql/src/Security/CWE-601/OpenUrlRedirect.ql
ql/go/ql/src/Security/CWE-640/EmailInjection.ql
ql/go/ql/src/Security/CWE-643/XPathInjection.ql
ql/go/ql/src/Security/CWE-681/IncorrectIntegerConversionQuery.ql
ql/go/ql/src/Security/CWE-770/UncontrolledAllocationSize.ql
ql/go/ql/src/Security/CWE-798/HardcodedCredentials.ql
ql/go/ql/src/Security/CWE-918/RequestForgery.ql
ql/go/ql/src/Summary/LinesOfCode.ql

View File

@@ -0,0 +1,33 @@
ql/go/ql/src/Diagnostics/ExtractionErrors.ql
ql/go/ql/src/Diagnostics/SuccessfullyExtractedFiles.ql
ql/go/ql/src/Security/CWE-020/IncompleteHostnameRegexp.ql
ql/go/ql/src/Security/CWE-020/IncompleteUrlSchemeCheck.ql
ql/go/ql/src/Security/CWE-020/MissingRegexpAnchor.ql
ql/go/ql/src/Security/CWE-020/SuspiciousCharacterInRegexp.ql
ql/go/ql/src/Security/CWE-022/TaintedPath.ql
ql/go/ql/src/Security/CWE-022/UnsafeUnzipSymlink.ql
ql/go/ql/src/Security/CWE-022/ZipSlip.ql
ql/go/ql/src/Security/CWE-078/CommandInjection.ql
ql/go/ql/src/Security/CWE-079/ReflectedXss.ql
ql/go/ql/src/Security/CWE-089/SqlInjection.ql
ql/go/ql/src/Security/CWE-089/StringBreak.ql
ql/go/ql/src/Security/CWE-117/LogInjection.ql
ql/go/ql/src/Security/CWE-190/AllocationSizeOverflow.ql
ql/go/ql/src/Security/CWE-209/StackTraceExposure.ql
ql/go/ql/src/Security/CWE-295/DisabledCertificateCheck.ql
ql/go/ql/src/Security/CWE-312/CleartextLogging.ql
ql/go/ql/src/Security/CWE-322/InsecureHostKeyCallback.ql
ql/go/ql/src/Security/CWE-326/InsufficientKeySize.ql
ql/go/ql/src/Security/CWE-327/InsecureTLS.ql
ql/go/ql/src/Security/CWE-338/InsecureRandomness.ql
ql/go/ql/src/Security/CWE-347/MissingJwtSignatureCheck.ql
ql/go/ql/src/Security/CWE-352/ConstantOauth2State.ql
ql/go/ql/src/Security/CWE-601/BadRedirectCheck.ql
ql/go/ql/src/Security/CWE-601/OpenUrlRedirect.ql
ql/go/ql/src/Security/CWE-640/EmailInjection.ql
ql/go/ql/src/Security/CWE-643/XPathInjection.ql
ql/go/ql/src/Security/CWE-681/IncorrectIntegerConversionQuery.ql
ql/go/ql/src/Security/CWE-770/UncontrolledAllocationSize.ql
ql/go/ql/src/Security/CWE-798/HardcodedCredentials.ql
ql/go/ql/src/Security/CWE-918/RequestForgery.ql
ql/go/ql/src/Summary/LinesOfCode.ql

View File

@@ -0,0 +1,33 @@
ql/go/ql/src/AlertSuppression.ql
ql/go/ql/src/Metrics/FLinesOfCode.ql
ql/go/ql/src/Metrics/FLinesOfComment.ql
ql/go/ql/src/Security/CWE-020/ExternalAPIsUsedWithUntrustedData.ql
ql/go/ql/src/Security/CWE-020/UntrustedDataToExternalAPI.ql
ql/go/ql/src/Security/CWE-020/UntrustedDataToUnknownExternalAPI.ql
ql/go/ql/src/Security/CWE-078/StoredCommand.ql
ql/go/ql/src/Security/CWE-079/StoredXss.ql
ql/go/ql/src/definitions.ql
ql/go/ql/src/experimental/CWE-090/LDAPInjection.ql
ql/go/ql/src/experimental/CWE-1004/CookieWithoutHttpOnly.ql
ql/go/ql/src/experimental/CWE-203/Timing.ql
ql/go/ql/src/experimental/CWE-285/PamAuthBypass.ql
ql/go/ql/src/experimental/CWE-287/ImproperLdapAuth.ql
ql/go/ql/src/experimental/CWE-321-V2/HardCodedKeys.ql
ql/go/ql/src/experimental/CWE-327/WeakCryptoAlgorithm.ql
ql/go/ql/src/experimental/CWE-369/DivideByZero.ql
ql/go/ql/src/experimental/CWE-400/DatabaseCallInLoop.ql
ql/go/ql/src/experimental/CWE-522-DecompressionBombs/DecompressionBombs.ql
ql/go/ql/src/experimental/CWE-525/WebCacheDeception.ql
ql/go/ql/src/experimental/CWE-74/DsnInjection.ql
ql/go/ql/src/experimental/CWE-74/DsnInjectionLocal.ql
ql/go/ql/src/experimental/CWE-79/HTMLTemplateEscapingPassthrough.ql
ql/go/ql/src/experimental/CWE-807/SensitiveConditionBypass.ql
ql/go/ql/src/experimental/CWE-840/ConditionalBypass.ql
ql/go/ql/src/experimental/CWE-918/SSRF.ql
ql/go/ql/src/experimental/CWE-942/CorsMisconfiguration.ql
ql/go/ql/src/experimental/InconsistentCode/DeferInLoop.ql
ql/go/ql/src/experimental/InconsistentCode/GORMErrorNotChecked.ql
ql/go/ql/src/experimental/IntegerOverflow/IntegerOverflow.ql
ql/go/ql/src/experimental/Unsafe/WrongUsageOfUnsafe.ql
ql/go/ql/src/filters/ClassifyFiles.ql
ql/go/ql/src/meta/frameworks/Coverage.ql

View File

@@ -0,0 +1,14 @@
import runs_on
import pytest
from query_suites import *
well_known_query_suites = ['go-code-quality.qls', 'go-security-and-quality.qls', 'go-security-extended.qls', 'go-code-scanning.qls']
@runs_on.posix
@pytest.mark.parametrize("query_suite", well_known_query_suites)
def test(codeql, go, check_query_suite, query_suite):
check_query_suite(query_suite)
@runs_on.posix
def test_not_included_queries(codeql, go, check_queries_not_included):
check_queries_not_included('go', well_known_query_suites)

View File

@@ -1,29 +1,14 @@
import os
import runs_on
import pytest
from query_suites import *
well_known_query_suites = ['java-code-quality.qls', 'java-security-and-quality.qls', 'java-security-extended.qls', 'java-code-scanning.qls']
@runs_on.posix
@pytest.mark.parametrize("query_suite", well_known_query_suites)
def test(codeql, java, cwd, expected_files, semmle_code_dir, query_suite):
actual = codeql.resolve.queries(query_suite, _capture=True).strip()
actual = sorted(actual.splitlines())
actual = [os.path.relpath(q, semmle_code_dir) for q in actual]
actual_file_name = query_suite + '.actual'
expected_files.add(actual_file_name)
(cwd / actual_file_name).write_text('\n'.join(actual)+'\n')
def test(codeql, java, check_query_suite, query_suite):
check_query_suite(query_suite)
@runs_on.posix
def test_not_included_queries(codeql, java, cwd, expected_files, semmle_code_dir):
all_queries = codeql.resolve.queries(semmle_code_dir / 'ql' / 'java' / 'ql' / 'src', _capture=True).strip().splitlines()
included_in_qls = set()
for query_suite in well_known_query_suites:
included_in_qls |= set(codeql.resolve.queries(query_suite, _capture=True).strip().splitlines())
not_included = sorted(set(all_queries) - included_in_qls)
not_included = [os.path.relpath(q, semmle_code_dir) for q in not_included]
not_included_file_name = 'not_included_in_qls.actual'
expected_files.add(not_included_file_name)
(cwd / not_included_file_name).write_text('\n'.join(not_included)+'\n')
def test_not_included_queries(codeql, java, check_queries_not_included):
check_queries_not_included('java', well_known_query_suites)

View File

@@ -0,0 +1,5 @@
ql/javascript/ql/src/Declarations/IneffectiveParameterType.ql
ql/javascript/ql/src/Expressions/ExprHasNoEffect.ql
ql/javascript/ql/src/Expressions/MissingAwait.ql
ql/javascript/ql/src/LanguageFeatures/SpuriousArguments.ql
ql/javascript/ql/src/RegExp/RegExpAlwaysMatches.ql

View File

@@ -0,0 +1,90 @@
ql/javascript/ql/src/AngularJS/DisablingSce.ql
ql/javascript/ql/src/AngularJS/DoubleCompilation.ql
ql/javascript/ql/src/AngularJS/InsecureUrlWhitelist.ql
ql/javascript/ql/src/Diagnostics/ExtractedFiles.ql
ql/javascript/ql/src/Diagnostics/ExtractionErrors.ql
ql/javascript/ql/src/Electron/AllowRunningInsecureContent.ql
ql/javascript/ql/src/Electron/DisablingWebSecurity.ql
ql/javascript/ql/src/Performance/PolynomialReDoS.ql
ql/javascript/ql/src/Performance/ReDoS.ql
ql/javascript/ql/src/RegExp/IdentityReplacement.ql
ql/javascript/ql/src/Security/CWE-020/IncompleteHostnameRegExp.ql
ql/javascript/ql/src/Security/CWE-020/IncompleteUrlSchemeCheck.ql
ql/javascript/ql/src/Security/CWE-020/IncompleteUrlSubstringSanitization.ql
ql/javascript/ql/src/Security/CWE-020/IncorrectSuffixCheck.ql
ql/javascript/ql/src/Security/CWE-020/OverlyLargeRange.ql
ql/javascript/ql/src/Security/CWE-020/UselessRegExpCharacterEscape.ql
ql/javascript/ql/src/Security/CWE-022/TaintedPath.ql
ql/javascript/ql/src/Security/CWE-022/ZipSlip.ql
ql/javascript/ql/src/Security/CWE-073/TemplateObjectInjection.ql
ql/javascript/ql/src/Security/CWE-078/CommandInjection.ql
ql/javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.ql
ql/javascript/ql/src/Security/CWE-078/ShellCommandInjectionFromEnvironment.ql
ql/javascript/ql/src/Security/CWE-078/UnsafeShellCommandConstruction.ql
ql/javascript/ql/src/Security/CWE-078/UselessUseOfCat.ql
ql/javascript/ql/src/Security/CWE-079/ExceptionXss.ql
ql/javascript/ql/src/Security/CWE-079/ReflectedXss.ql
ql/javascript/ql/src/Security/CWE-079/StoredXss.ql
ql/javascript/ql/src/Security/CWE-079/UnsafeHtmlConstruction.ql
ql/javascript/ql/src/Security/CWE-079/UnsafeJQueryPlugin.ql
ql/javascript/ql/src/Security/CWE-079/Xss.ql
ql/javascript/ql/src/Security/CWE-079/XssThroughDom.ql
ql/javascript/ql/src/Security/CWE-089/SqlInjection.ql
ql/javascript/ql/src/Security/CWE-094/CodeInjection.ql
ql/javascript/ql/src/Security/CWE-094/ExpressionInjection.ql
ql/javascript/ql/src/Security/CWE-094/ImproperCodeSanitization.ql
ql/javascript/ql/src/Security/CWE-094/UnsafeDynamicMethodAccess.ql
ql/javascript/ql/src/Security/CWE-1004/ClientExposedCookie.ql
ql/javascript/ql/src/Security/CWE-116/BadTagFilter.ql
ql/javascript/ql/src/Security/CWE-116/DoubleEscaping.ql
ql/javascript/ql/src/Security/CWE-116/IncompleteHtmlAttributeSanitization.ql
ql/javascript/ql/src/Security/CWE-116/IncompleteMultiCharacterSanitization.ql
ql/javascript/ql/src/Security/CWE-116/IncompleteSanitization.ql
ql/javascript/ql/src/Security/CWE-116/UnsafeHtmlExpansion.ql
ql/javascript/ql/src/Security/CWE-134/TaintedFormatString.ql
ql/javascript/ql/src/Security/CWE-178/CaseSensitiveMiddlewarePath.ql
ql/javascript/ql/src/Security/CWE-200/PrivateFileExposure.ql
ql/javascript/ql/src/Security/CWE-201/PostMessageStar.ql
ql/javascript/ql/src/Security/CWE-209/StackTraceExposure.ql
ql/javascript/ql/src/Security/CWE-295/DisablingCertificateValidation.ql
ql/javascript/ql/src/Security/CWE-300/InsecureDependencyResolution.ql
ql/javascript/ql/src/Security/CWE-312/ActionsArtifactLeak.ql
ql/javascript/ql/src/Security/CWE-312/BuildArtifactLeak.ql
ql/javascript/ql/src/Security/CWE-312/CleartextLogging.ql
ql/javascript/ql/src/Security/CWE-312/CleartextStorage.ql
ql/javascript/ql/src/Security/CWE-326/InsufficientKeySize.ql
ql/javascript/ql/src/Security/CWE-327/BadRandomness.ql
ql/javascript/ql/src/Security/CWE-327/BrokenCryptoAlgorithm.ql
ql/javascript/ql/src/Security/CWE-338/InsecureRandomness.ql
ql/javascript/ql/src/Security/CWE-346/CorsMisconfigurationForCredentials.ql
ql/javascript/ql/src/Security/CWE-347/MissingJWTKeyVerification.ql
ql/javascript/ql/src/Security/CWE-352/MissingCsrfMiddleware.ql
ql/javascript/ql/src/Security/CWE-400/DeepObjectResourceExhaustion.ql
ql/javascript/ql/src/Security/CWE-502/UnsafeDeserialization.ql
ql/javascript/ql/src/Security/CWE-598/SensitiveGetQuery.ql
ql/javascript/ql/src/Security/CWE-601/ClientSideUrlRedirect.ql
ql/javascript/ql/src/Security/CWE-601/ServerSideUrlRedirect.ql
ql/javascript/ql/src/Security/CWE-611/Xxe.ql
ql/javascript/ql/src/Security/CWE-614/ClearTextCookie.ql
ql/javascript/ql/src/Security/CWE-640/HostHeaderPoisoningInEmailGeneration.ql
ql/javascript/ql/src/Security/CWE-643/XpathInjection.ql
ql/javascript/ql/src/Security/CWE-693/InsecureHelmet.ql
ql/javascript/ql/src/Security/CWE-730/RegExpInjection.ql
ql/javascript/ql/src/Security/CWE-730/ServerCrash.ql
ql/javascript/ql/src/Security/CWE-754/UnvalidatedDynamicMethodCall.ql
ql/javascript/ql/src/Security/CWE-770/MissingRateLimiting.ql
ql/javascript/ql/src/Security/CWE-770/ResourceExhaustion.ql
ql/javascript/ql/src/Security/CWE-776/XmlBomb.ql
ql/javascript/ql/src/Security/CWE-798/HardcodedCredentials.ql
ql/javascript/ql/src/Security/CWE-829/InsecureDownload.ql
ql/javascript/ql/src/Security/CWE-830/FunctionalityFromUntrustedDomain.ql
ql/javascript/ql/src/Security/CWE-830/FunctionalityFromUntrustedSource.ql
ql/javascript/ql/src/Security/CWE-834/LoopBoundInjection.ql
ql/javascript/ql/src/Security/CWE-843/TypeConfusionThroughParameterTampering.ql
ql/javascript/ql/src/Security/CWE-915/PrototypePollutingAssignment.ql
ql/javascript/ql/src/Security/CWE-915/PrototypePollutingFunction.ql
ql/javascript/ql/src/Security/CWE-915/PrototypePollutingMergeCall.ql
ql/javascript/ql/src/Security/CWE-916/InsufficientPasswordHash.ql
ql/javascript/ql/src/Security/CWE-918/RequestForgery.ql
ql/javascript/ql/src/Summary/LinesOfCode.ql
ql/javascript/ql/src/Summary/LinesOfUserCode.ql

View File

@@ -0,0 +1,205 @@
ql/javascript/ql/src/AngularJS/DependencyMismatch.ql
ql/javascript/ql/src/AngularJS/DisablingSce.ql
ql/javascript/ql/src/AngularJS/DoubleCompilation.ql
ql/javascript/ql/src/AngularJS/DuplicateDependency.ql
ql/javascript/ql/src/AngularJS/IncompatibleService.ql
ql/javascript/ql/src/AngularJS/InsecureUrlWhitelist.ql
ql/javascript/ql/src/AngularJS/MissingExplicitInjection.ql
ql/javascript/ql/src/AngularJS/RepeatedInjection.ql
ql/javascript/ql/src/AngularJS/UseNgSrc.ql
ql/javascript/ql/src/DOM/DuplicateAttributes.ql
ql/javascript/ql/src/DOM/MalformedIdAttribute.ql
ql/javascript/ql/src/DOM/PseudoEval.ql
ql/javascript/ql/src/Declarations/ArgumentsRedefined.ql
ql/javascript/ql/src/Declarations/AssignmentToConst.ql
ql/javascript/ql/src/Declarations/ClobberingVarInit.ql
ql/javascript/ql/src/Declarations/ConflictingFunctions.ql
ql/javascript/ql/src/Declarations/DeadStoreOfLocal.ql
ql/javascript/ql/src/Declarations/DeadStoreOfProperty.ql
ql/javascript/ql/src/Declarations/DeclBeforeUse.ql
ql/javascript/ql/src/Declarations/DefaultArgumentReferencesNestedFunction.ql
ql/javascript/ql/src/Declarations/DuplicateVarDecl.ql
ql/javascript/ql/src/Declarations/IneffectiveParameterType.ql
ql/javascript/ql/src/Declarations/MissingThisQualifier.ql
ql/javascript/ql/src/Declarations/MissingVarDecl.ql
ql/javascript/ql/src/Declarations/MixedStaticInstanceThisAccess.ql
ql/javascript/ql/src/Declarations/SuspiciousMethodNameDeclaration.ql
ql/javascript/ql/src/Declarations/TemporalDeadZone.ql
ql/javascript/ql/src/Declarations/UniqueParameterNames.ql
ql/javascript/ql/src/Declarations/UniquePropertyNames.ql
ql/javascript/ql/src/Declarations/UnreachableMethodOverloads.ql
ql/javascript/ql/src/Declarations/UnusedVariable.ql
ql/javascript/ql/src/Diagnostics/ExtractedFiles.ql
ql/javascript/ql/src/Diagnostics/ExtractionErrors.ql
ql/javascript/ql/src/Electron/AllowRunningInsecureContent.ql
ql/javascript/ql/src/Electron/DisablingWebSecurity.ql
ql/javascript/ql/src/Expressions/ComparisonWithNaN.ql
ql/javascript/ql/src/Expressions/DuplicateCondition.ql
ql/javascript/ql/src/Expressions/DuplicateProperty.ql
ql/javascript/ql/src/Expressions/DuplicateSwitchCase.ql
ql/javascript/ql/src/Expressions/ExprHasNoEffect.ql
ql/javascript/ql/src/Expressions/HeterogeneousComparison.ql
ql/javascript/ql/src/Expressions/ImplicitOperandConversion.ql
ql/javascript/ql/src/Expressions/MissingAwait.ql
ql/javascript/ql/src/Expressions/MissingDotLengthInComparison.ql
ql/javascript/ql/src/Expressions/MissingSpaceInAppend.ql
ql/javascript/ql/src/Expressions/MisspelledVariableName.ql
ql/javascript/ql/src/Expressions/RedundantExpression.ql
ql/javascript/ql/src/Expressions/SelfAssignment.ql
ql/javascript/ql/src/Expressions/ShiftOutOfRange.ql
ql/javascript/ql/src/Expressions/StringInsteadOfRegex.ql
ql/javascript/ql/src/Expressions/SuspiciousInvocation.ql
ql/javascript/ql/src/Expressions/SuspiciousPropAccess.ql
ql/javascript/ql/src/Expressions/UnboundEventHandlerReceiver.ql
ql/javascript/ql/src/Expressions/UnclearOperatorPrecedence.ql
ql/javascript/ql/src/Expressions/UnknownDirective.ql
ql/javascript/ql/src/Expressions/UnneededDefensiveProgramming.ql
ql/javascript/ql/src/Expressions/WhitespaceContradictsPrecedence.ql
ql/javascript/ql/src/LanguageFeatures/BadTypeof.ql
ql/javascript/ql/src/LanguageFeatures/ConditionalComments.ql
ql/javascript/ql/src/LanguageFeatures/DeleteVar.ql
ql/javascript/ql/src/LanguageFeatures/ExpressionClosures.ql
ql/javascript/ql/src/LanguageFeatures/ForInComprehensionBlocks.ql
ql/javascript/ql/src/LanguageFeatures/IllegalInvocation.ql
ql/javascript/ql/src/LanguageFeatures/InconsistentNew.ql
ql/javascript/ql/src/LanguageFeatures/InvalidPrototype.ql
ql/javascript/ql/src/LanguageFeatures/LengthComparisonOffByOne.ql
ql/javascript/ql/src/LanguageFeatures/NonLinearPattern.ql
ql/javascript/ql/src/LanguageFeatures/PropertyWriteOnPrimitive.ql
ql/javascript/ql/src/LanguageFeatures/SemicolonInsertion.ql
ql/javascript/ql/src/LanguageFeatures/SetterReturn.ql
ql/javascript/ql/src/LanguageFeatures/SpuriousArguments.ql
ql/javascript/ql/src/LanguageFeatures/StrictModeCallStackIntrospection.ql
ql/javascript/ql/src/LanguageFeatures/SyntaxError.ql
ql/javascript/ql/src/LanguageFeatures/TemplateSyntaxInStringLiteral.ql
ql/javascript/ql/src/LanguageFeatures/ThisBeforeSuper.ql
ql/javascript/ql/src/LanguageFeatures/UnusedIndexVariable.ql
ql/javascript/ql/src/LanguageFeatures/WithStatement.ql
ql/javascript/ql/src/LanguageFeatures/YieldInNonGenerator.ql
ql/javascript/ql/src/NodeJS/InvalidExport.ql
ql/javascript/ql/src/NodeJS/MissingExports.ql
ql/javascript/ql/src/Performance/PolynomialReDoS.ql
ql/javascript/ql/src/Performance/ReDoS.ql
ql/javascript/ql/src/React/DirectStateMutation.ql
ql/javascript/ql/src/React/InconsistentStateUpdate.ql
ql/javascript/ql/src/React/UnsupportedStateUpdateInLifecycleMethod.ql
ql/javascript/ql/src/React/UnusedOrUndefinedStateProperty.ql
ql/javascript/ql/src/RegExp/BackrefBeforeGroup.ql
ql/javascript/ql/src/RegExp/BackrefIntoNegativeLookahead.ql
ql/javascript/ql/src/RegExp/DuplicateCharacterInCharacterClass.ql
ql/javascript/ql/src/RegExp/EmptyCharacterClass.ql
ql/javascript/ql/src/RegExp/IdentityReplacement.ql
ql/javascript/ql/src/RegExp/RegExpAlwaysMatches.ql
ql/javascript/ql/src/RegExp/UnboundBackref.ql
ql/javascript/ql/src/RegExp/UnmatchableCaret.ql
ql/javascript/ql/src/RegExp/UnmatchableDollar.ql
ql/javascript/ql/src/Security/CWE-020/IncompleteHostnameRegExp.ql
ql/javascript/ql/src/Security/CWE-020/IncompleteUrlSchemeCheck.ql
ql/javascript/ql/src/Security/CWE-020/IncompleteUrlSubstringSanitization.ql
ql/javascript/ql/src/Security/CWE-020/IncorrectSuffixCheck.ql
ql/javascript/ql/src/Security/CWE-020/MissingOriginCheck.ql
ql/javascript/ql/src/Security/CWE-020/MissingRegExpAnchor.ql
ql/javascript/ql/src/Security/CWE-020/OverlyLargeRange.ql
ql/javascript/ql/src/Security/CWE-020/UselessRegExpCharacterEscape.ql
ql/javascript/ql/src/Security/CWE-022/TaintedPath.ql
ql/javascript/ql/src/Security/CWE-022/ZipSlip.ql
ql/javascript/ql/src/Security/CWE-073/TemplateObjectInjection.ql
ql/javascript/ql/src/Security/CWE-078/CommandInjection.ql
ql/javascript/ql/src/Security/CWE-078/IndirectCommandInjection.ql
ql/javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.ql
ql/javascript/ql/src/Security/CWE-078/ShellCommandInjectionFromEnvironment.ql
ql/javascript/ql/src/Security/CWE-078/UnsafeShellCommandConstruction.ql
ql/javascript/ql/src/Security/CWE-078/UselessUseOfCat.ql
ql/javascript/ql/src/Security/CWE-079/ExceptionXss.ql
ql/javascript/ql/src/Security/CWE-079/ReflectedXss.ql
ql/javascript/ql/src/Security/CWE-079/StoredXss.ql
ql/javascript/ql/src/Security/CWE-079/UnsafeHtmlConstruction.ql
ql/javascript/ql/src/Security/CWE-079/UnsafeJQueryPlugin.ql
ql/javascript/ql/src/Security/CWE-079/Xss.ql
ql/javascript/ql/src/Security/CWE-079/XssThroughDom.ql
ql/javascript/ql/src/Security/CWE-089/SqlInjection.ql
ql/javascript/ql/src/Security/CWE-094/CodeInjection.ql
ql/javascript/ql/src/Security/CWE-094/ExpressionInjection.ql
ql/javascript/ql/src/Security/CWE-094/ImproperCodeSanitization.ql
ql/javascript/ql/src/Security/CWE-094/UnsafeCodeConstruction.ql
ql/javascript/ql/src/Security/CWE-094/UnsafeDynamicMethodAccess.ql
ql/javascript/ql/src/Security/CWE-1004/ClientExposedCookie.ql
ql/javascript/ql/src/Security/CWE-116/BadTagFilter.ql
ql/javascript/ql/src/Security/CWE-116/DoubleEscaping.ql
ql/javascript/ql/src/Security/CWE-116/IncompleteHtmlAttributeSanitization.ql
ql/javascript/ql/src/Security/CWE-116/IncompleteMultiCharacterSanitization.ql
ql/javascript/ql/src/Security/CWE-116/IncompleteSanitization.ql
ql/javascript/ql/src/Security/CWE-116/UnsafeHtmlExpansion.ql
ql/javascript/ql/src/Security/CWE-117/LogInjection.ql
ql/javascript/ql/src/Security/CWE-1275/SameSiteNoneCookie.ql
ql/javascript/ql/src/Security/CWE-134/TaintedFormatString.ql
ql/javascript/ql/src/Security/CWE-178/CaseSensitiveMiddlewarePath.ql
ql/javascript/ql/src/Security/CWE-200/FileAccessToHttp.ql
ql/javascript/ql/src/Security/CWE-200/PrivateFileExposure.ql
ql/javascript/ql/src/Security/CWE-201/PostMessageStar.ql
ql/javascript/ql/src/Security/CWE-209/StackTraceExposure.ql
ql/javascript/ql/src/Security/CWE-295/DisablingCertificateValidation.ql
ql/javascript/ql/src/Security/CWE-300/InsecureDependencyResolution.ql
ql/javascript/ql/src/Security/CWE-312/ActionsArtifactLeak.ql
ql/javascript/ql/src/Security/CWE-312/BuildArtifactLeak.ql
ql/javascript/ql/src/Security/CWE-312/CleartextLogging.ql
ql/javascript/ql/src/Security/CWE-312/CleartextStorage.ql
ql/javascript/ql/src/Security/CWE-313/PasswordInConfigurationFile.ql
ql/javascript/ql/src/Security/CWE-326/InsufficientKeySize.ql
ql/javascript/ql/src/Security/CWE-327/BadRandomness.ql
ql/javascript/ql/src/Security/CWE-327/BrokenCryptoAlgorithm.ql
ql/javascript/ql/src/Security/CWE-338/InsecureRandomness.ql
ql/javascript/ql/src/Security/CWE-346/CorsMisconfigurationForCredentials.ql
ql/javascript/ql/src/Security/CWE-347/MissingJWTKeyVerification.ql
ql/javascript/ql/src/Security/CWE-352/MissingCsrfMiddleware.ql
ql/javascript/ql/src/Security/CWE-367/FileSystemRace.ql
ql/javascript/ql/src/Security/CWE-377/InsecureTemporaryFile.ql
ql/javascript/ql/src/Security/CWE-384/SessionFixation.ql
ql/javascript/ql/src/Security/CWE-400/DeepObjectResourceExhaustion.ql
ql/javascript/ql/src/Security/CWE-400/RemotePropertyInjection.ql
ql/javascript/ql/src/Security/CWE-502/UnsafeDeserialization.ql
ql/javascript/ql/src/Security/CWE-506/HardcodedDataInterpretedAsCode.ql
ql/javascript/ql/src/Security/CWE-598/SensitiveGetQuery.ql
ql/javascript/ql/src/Security/CWE-601/ClientSideUrlRedirect.ql
ql/javascript/ql/src/Security/CWE-601/ServerSideUrlRedirect.ql
ql/javascript/ql/src/Security/CWE-611/Xxe.ql
ql/javascript/ql/src/Security/CWE-614/ClearTextCookie.ql
ql/javascript/ql/src/Security/CWE-640/HostHeaderPoisoningInEmailGeneration.ql
ql/javascript/ql/src/Security/CWE-643/XpathInjection.ql
ql/javascript/ql/src/Security/CWE-693/InsecureHelmet.ql
ql/javascript/ql/src/Security/CWE-730/RegExpInjection.ql
ql/javascript/ql/src/Security/CWE-730/ServerCrash.ql
ql/javascript/ql/src/Security/CWE-754/UnvalidatedDynamicMethodCall.ql
ql/javascript/ql/src/Security/CWE-770/MissingRateLimiting.ql
ql/javascript/ql/src/Security/CWE-770/ResourceExhaustion.ql
ql/javascript/ql/src/Security/CWE-776/XmlBomb.ql
ql/javascript/ql/src/Security/CWE-798/HardcodedCredentials.ql
ql/javascript/ql/src/Security/CWE-807/ConditionalBypass.ql
ql/javascript/ql/src/Security/CWE-829/InsecureDownload.ql
ql/javascript/ql/src/Security/CWE-830/FunctionalityFromUntrustedDomain.ql
ql/javascript/ql/src/Security/CWE-830/FunctionalityFromUntrustedSource.ql
ql/javascript/ql/src/Security/CWE-834/LoopBoundInjection.ql
ql/javascript/ql/src/Security/CWE-843/TypeConfusionThroughParameterTampering.ql
ql/javascript/ql/src/Security/CWE-862/EmptyPasswordInConfigurationFile.ql
ql/javascript/ql/src/Security/CWE-912/HttpToFileAccess.ql
ql/javascript/ql/src/Security/CWE-915/PrototypePollutingAssignment.ql
ql/javascript/ql/src/Security/CWE-915/PrototypePollutingFunction.ql
ql/javascript/ql/src/Security/CWE-915/PrototypePollutingMergeCall.ql
ql/javascript/ql/src/Security/CWE-916/InsufficientPasswordHash.ql
ql/javascript/ql/src/Security/CWE-918/ClientSideRequestForgery.ql
ql/javascript/ql/src/Security/CWE-918/RequestForgery.ql
ql/javascript/ql/src/Statements/DanglingElse.ql
ql/javascript/ql/src/Statements/IgnoreArrayResult.ql
ql/javascript/ql/src/Statements/InconsistentLoopOrientation.ql
ql/javascript/ql/src/Statements/LabelInCase.ql
ql/javascript/ql/src/Statements/LoopIterationSkippedDueToShifting.ql
ql/javascript/ql/src/Statements/MisleadingIndentationAfterControlStmt.ql
ql/javascript/ql/src/Statements/ReturnAssignsLocal.ql
ql/javascript/ql/src/Statements/SuspiciousUnusedLoopIterationVariable.ql
ql/javascript/ql/src/Statements/UnreachableStatement.ql
ql/javascript/ql/src/Statements/UseOfReturnlessFunction.ql
ql/javascript/ql/src/Statements/UselessComparisonTest.ql
ql/javascript/ql/src/Statements/UselessConditional.ql
ql/javascript/ql/src/Summary/LinesOfCode.ql
ql/javascript/ql/src/Summary/LinesOfUserCode.ql
ql/javascript/ql/src/Vue/ArrowMethodOnVueInstance.ql

View File

@@ -0,0 +1,107 @@
ql/javascript/ql/src/AngularJS/DisablingSce.ql
ql/javascript/ql/src/AngularJS/DoubleCompilation.ql
ql/javascript/ql/src/AngularJS/InsecureUrlWhitelist.ql
ql/javascript/ql/src/Diagnostics/ExtractedFiles.ql
ql/javascript/ql/src/Diagnostics/ExtractionErrors.ql
ql/javascript/ql/src/Electron/AllowRunningInsecureContent.ql
ql/javascript/ql/src/Electron/DisablingWebSecurity.ql
ql/javascript/ql/src/Performance/PolynomialReDoS.ql
ql/javascript/ql/src/Performance/ReDoS.ql
ql/javascript/ql/src/RegExp/IdentityReplacement.ql
ql/javascript/ql/src/Security/CWE-020/IncompleteHostnameRegExp.ql
ql/javascript/ql/src/Security/CWE-020/IncompleteUrlSchemeCheck.ql
ql/javascript/ql/src/Security/CWE-020/IncompleteUrlSubstringSanitization.ql
ql/javascript/ql/src/Security/CWE-020/IncorrectSuffixCheck.ql
ql/javascript/ql/src/Security/CWE-020/MissingOriginCheck.ql
ql/javascript/ql/src/Security/CWE-020/MissingRegExpAnchor.ql
ql/javascript/ql/src/Security/CWE-020/OverlyLargeRange.ql
ql/javascript/ql/src/Security/CWE-020/UselessRegExpCharacterEscape.ql
ql/javascript/ql/src/Security/CWE-022/TaintedPath.ql
ql/javascript/ql/src/Security/CWE-022/ZipSlip.ql
ql/javascript/ql/src/Security/CWE-073/TemplateObjectInjection.ql
ql/javascript/ql/src/Security/CWE-078/CommandInjection.ql
ql/javascript/ql/src/Security/CWE-078/IndirectCommandInjection.ql
ql/javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.ql
ql/javascript/ql/src/Security/CWE-078/ShellCommandInjectionFromEnvironment.ql
ql/javascript/ql/src/Security/CWE-078/UnsafeShellCommandConstruction.ql
ql/javascript/ql/src/Security/CWE-078/UselessUseOfCat.ql
ql/javascript/ql/src/Security/CWE-079/ExceptionXss.ql
ql/javascript/ql/src/Security/CWE-079/ReflectedXss.ql
ql/javascript/ql/src/Security/CWE-079/StoredXss.ql
ql/javascript/ql/src/Security/CWE-079/UnsafeHtmlConstruction.ql
ql/javascript/ql/src/Security/CWE-079/UnsafeJQueryPlugin.ql
ql/javascript/ql/src/Security/CWE-079/Xss.ql
ql/javascript/ql/src/Security/CWE-079/XssThroughDom.ql
ql/javascript/ql/src/Security/CWE-089/SqlInjection.ql
ql/javascript/ql/src/Security/CWE-094/CodeInjection.ql
ql/javascript/ql/src/Security/CWE-094/ExpressionInjection.ql
ql/javascript/ql/src/Security/CWE-094/ImproperCodeSanitization.ql
ql/javascript/ql/src/Security/CWE-094/UnsafeCodeConstruction.ql
ql/javascript/ql/src/Security/CWE-094/UnsafeDynamicMethodAccess.ql
ql/javascript/ql/src/Security/CWE-1004/ClientExposedCookie.ql
ql/javascript/ql/src/Security/CWE-116/BadTagFilter.ql
ql/javascript/ql/src/Security/CWE-116/DoubleEscaping.ql
ql/javascript/ql/src/Security/CWE-116/IncompleteHtmlAttributeSanitization.ql
ql/javascript/ql/src/Security/CWE-116/IncompleteMultiCharacterSanitization.ql
ql/javascript/ql/src/Security/CWE-116/IncompleteSanitization.ql
ql/javascript/ql/src/Security/CWE-116/UnsafeHtmlExpansion.ql
ql/javascript/ql/src/Security/CWE-117/LogInjection.ql
ql/javascript/ql/src/Security/CWE-1275/SameSiteNoneCookie.ql
ql/javascript/ql/src/Security/CWE-134/TaintedFormatString.ql
ql/javascript/ql/src/Security/CWE-178/CaseSensitiveMiddlewarePath.ql
ql/javascript/ql/src/Security/CWE-200/FileAccessToHttp.ql
ql/javascript/ql/src/Security/CWE-200/PrivateFileExposure.ql
ql/javascript/ql/src/Security/CWE-201/PostMessageStar.ql
ql/javascript/ql/src/Security/CWE-209/StackTraceExposure.ql
ql/javascript/ql/src/Security/CWE-295/DisablingCertificateValidation.ql
ql/javascript/ql/src/Security/CWE-300/InsecureDependencyResolution.ql
ql/javascript/ql/src/Security/CWE-312/ActionsArtifactLeak.ql
ql/javascript/ql/src/Security/CWE-312/BuildArtifactLeak.ql
ql/javascript/ql/src/Security/CWE-312/CleartextLogging.ql
ql/javascript/ql/src/Security/CWE-312/CleartextStorage.ql
ql/javascript/ql/src/Security/CWE-313/PasswordInConfigurationFile.ql
ql/javascript/ql/src/Security/CWE-326/InsufficientKeySize.ql
ql/javascript/ql/src/Security/CWE-327/BadRandomness.ql
ql/javascript/ql/src/Security/CWE-327/BrokenCryptoAlgorithm.ql
ql/javascript/ql/src/Security/CWE-338/InsecureRandomness.ql
ql/javascript/ql/src/Security/CWE-346/CorsMisconfigurationForCredentials.ql
ql/javascript/ql/src/Security/CWE-347/MissingJWTKeyVerification.ql
ql/javascript/ql/src/Security/CWE-352/MissingCsrfMiddleware.ql
ql/javascript/ql/src/Security/CWE-367/FileSystemRace.ql
ql/javascript/ql/src/Security/CWE-377/InsecureTemporaryFile.ql
ql/javascript/ql/src/Security/CWE-384/SessionFixation.ql
ql/javascript/ql/src/Security/CWE-400/DeepObjectResourceExhaustion.ql
ql/javascript/ql/src/Security/CWE-400/RemotePropertyInjection.ql
ql/javascript/ql/src/Security/CWE-502/UnsafeDeserialization.ql
ql/javascript/ql/src/Security/CWE-506/HardcodedDataInterpretedAsCode.ql
ql/javascript/ql/src/Security/CWE-598/SensitiveGetQuery.ql
ql/javascript/ql/src/Security/CWE-601/ClientSideUrlRedirect.ql
ql/javascript/ql/src/Security/CWE-601/ServerSideUrlRedirect.ql
ql/javascript/ql/src/Security/CWE-611/Xxe.ql
ql/javascript/ql/src/Security/CWE-614/ClearTextCookie.ql
ql/javascript/ql/src/Security/CWE-640/HostHeaderPoisoningInEmailGeneration.ql
ql/javascript/ql/src/Security/CWE-643/XpathInjection.ql
ql/javascript/ql/src/Security/CWE-693/InsecureHelmet.ql
ql/javascript/ql/src/Security/CWE-730/RegExpInjection.ql
ql/javascript/ql/src/Security/CWE-730/ServerCrash.ql
ql/javascript/ql/src/Security/CWE-754/UnvalidatedDynamicMethodCall.ql
ql/javascript/ql/src/Security/CWE-770/MissingRateLimiting.ql
ql/javascript/ql/src/Security/CWE-770/ResourceExhaustion.ql
ql/javascript/ql/src/Security/CWE-776/XmlBomb.ql
ql/javascript/ql/src/Security/CWE-798/HardcodedCredentials.ql
ql/javascript/ql/src/Security/CWE-807/ConditionalBypass.ql
ql/javascript/ql/src/Security/CWE-829/InsecureDownload.ql
ql/javascript/ql/src/Security/CWE-830/FunctionalityFromUntrustedDomain.ql
ql/javascript/ql/src/Security/CWE-830/FunctionalityFromUntrustedSource.ql
ql/javascript/ql/src/Security/CWE-834/LoopBoundInjection.ql
ql/javascript/ql/src/Security/CWE-843/TypeConfusionThroughParameterTampering.ql
ql/javascript/ql/src/Security/CWE-862/EmptyPasswordInConfigurationFile.ql
ql/javascript/ql/src/Security/CWE-912/HttpToFileAccess.ql
ql/javascript/ql/src/Security/CWE-915/PrototypePollutingAssignment.ql
ql/javascript/ql/src/Security/CWE-915/PrototypePollutingFunction.ql
ql/javascript/ql/src/Security/CWE-915/PrototypePollutingMergeCall.ql
ql/javascript/ql/src/Security/CWE-916/InsufficientPasswordHash.ql
ql/javascript/ql/src/Security/CWE-918/ClientSideRequestForgery.ql
ql/javascript/ql/src/Security/CWE-918/RequestForgery.ql
ql/javascript/ql/src/Summary/LinesOfCode.ql
ql/javascript/ql/src/Summary/LinesOfUserCode.ql

View File

@@ -0,0 +1,148 @@
ql/javascript/ql/src/AlertSuppression.ql
ql/javascript/ql/src/AngularJS/DeadAngularJSEventListener.ql
ql/javascript/ql/src/AngularJS/UnusedAngularDependency.ql
ql/javascript/ql/src/Comments/CommentedOutCode.ql
ql/javascript/ql/src/Comments/FCommentedOutCode.ql
ql/javascript/ql/src/Comments/TodoComments.ql
ql/javascript/ql/src/DOM/Alert.ql
ql/javascript/ql/src/DOM/AmbiguousIdAttribute.ql
ql/javascript/ql/src/DOM/ConflictingAttributes.ql
ql/javascript/ql/src/DOM/TargetBlank.ql
ql/javascript/ql/src/Declarations/DeadStoreOfGlobal.ql
ql/javascript/ql/src/Declarations/RedeclaredVariable.ql
ql/javascript/ql/src/Declarations/TooManyParameters.ql
ql/javascript/ql/src/Declarations/UnstableCyclicImport.ql
ql/javascript/ql/src/Declarations/UnusedParameter.ql
ql/javascript/ql/src/Declarations/UnusedProperty.ql
ql/javascript/ql/src/Electron/EnablingNodeIntegration.ql
ql/javascript/ql/src/Expressions/BitwiseSignCheck.ql
ql/javascript/ql/src/Expressions/CompareIdenticalValues.ql
ql/javascript/ql/src/Expressions/MisspelledIdentifier.ql
ql/javascript/ql/src/JSDoc/BadParamTag.ql
ql/javascript/ql/src/JSDoc/JSDocForNonExistentParameter.ql
ql/javascript/ql/src/JSDoc/UndocumentedParameter.ql
ql/javascript/ql/src/LanguageFeatures/ArgumentsCallerCallee.ql
ql/javascript/ql/src/LanguageFeatures/DebuggerStatement.ql
ql/javascript/ql/src/LanguageFeatures/EmptyArrayInit.ql
ql/javascript/ql/src/LanguageFeatures/Eval.ql
ql/javascript/ql/src/LanguageFeatures/JumpFromFinally.ql
ql/javascript/ql/src/LanguageFeatures/SetterIgnoresParameter.ql
ql/javascript/ql/src/LanguageFeatures/WrongExtensionJSON.ql
ql/javascript/ql/src/Metrics/Dependencies/ExternalDependencies.ql
ql/javascript/ql/src/Metrics/Dependencies/ExternalDependenciesSourceLinks.ql
ql/javascript/ql/src/Metrics/FCommentRatio.ql
ql/javascript/ql/src/Metrics/FCyclomaticComplexity.ql
ql/javascript/ql/src/Metrics/FFunctions.ql
ql/javascript/ql/src/Metrics/FLines.ql
ql/javascript/ql/src/Metrics/FLinesOfCode.ql
ql/javascript/ql/src/Metrics/FLinesOfComment.ql
ql/javascript/ql/src/Metrics/FLinesOfDuplicatedCode.ql
ql/javascript/ql/src/Metrics/FLinesOfSimilarCode.ql
ql/javascript/ql/src/Metrics/FNumberOfStatements.ql
ql/javascript/ql/src/Metrics/FNumberOfTests.ql
ql/javascript/ql/src/Metrics/FUseOfES6.ql
ql/javascript/ql/src/Metrics/FunCyclomaticComplexity.ql
ql/javascript/ql/src/Metrics/FunLinesOfCode.ql
ql/javascript/ql/src/NodeJS/CyclicImport.ql
ql/javascript/ql/src/NodeJS/DubiousImport.ql
ql/javascript/ql/src/NodeJS/UnresolvableImport.ql
ql/javascript/ql/src/NodeJS/UnusedDependency.ql
ql/javascript/ql/src/Performance/NonLocalForIn.ql
ql/javascript/ql/src/Performance/ReassignParameterAndUseArguments.ql
ql/javascript/ql/src/RegExp/BackspaceEscape.ql
ql/javascript/ql/src/RegExp/MalformedRegExp.ql
ql/javascript/ql/src/Security/CWE-020/ExternalAPIsUsedWithUntrustedData.ql
ql/javascript/ql/src/Security/CWE-020/UntrustedDataToExternalAPI.ql
ql/javascript/ql/src/Security/CWE-451/MissingXFrameOptions.ql
ql/javascript/ql/src/Security/CWE-807/DifferentKindsComparisonBypass.ql
ql/javascript/ql/src/Security/trest/test.ql
ql/javascript/ql/src/Statements/EphemeralLoop.ql
ql/javascript/ql/src/Statements/ImplicitReturn.ql
ql/javascript/ql/src/Statements/InconsistentReturn.ql
ql/javascript/ql/src/Statements/NestedLoopsSameVariable.ql
ql/javascript/ql/src/Statements/ReturnOutsideFunction.ql
ql/javascript/ql/src/Summary/TaintSinks.ql
ql/javascript/ql/src/Summary/TaintSources.ql
ql/javascript/ql/src/definitions.ql
ql/javascript/ql/src/experimental/Security/CWE-094-dataURL/CodeInjection.ql
ql/javascript/ql/src/experimental/Security/CWE-094/UntrustedCheckout.ql
ql/javascript/ql/src/experimental/Security/CWE-099/EnvValueAndKeyInjection.ql
ql/javascript/ql/src/experimental/Security/CWE-099/EnvValueInjection.ql
ql/javascript/ql/src/experimental/Security/CWE-340/TokenBuiltFromUUID.ql
ql/javascript/ql/src/experimental/Security/CWE-347/decodeJwtWithoutVerification.ql
ql/javascript/ql/src/experimental/Security/CWE-347/decodeJwtWithoutVerificationLocalSource.ql
ql/javascript/ql/src/experimental/Security/CWE-444/InsecureHttpParser.ql
ql/javascript/ql/src/experimental/Security/CWE-522-DecompressionBombs/DecompressionBombs.ql
ql/javascript/ql/src/experimental/Security/CWE-918/SSRF.ql
ql/javascript/ql/src/experimental/Security/CWE-942/CorsPermissiveConfiguration.ql
ql/javascript/ql/src/experimental/StandardLibrary/MultipleArgumentsToSetConstructor.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-020/UntrustedDataToExternalAPI.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-078/CommandInjection.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-079/Xss.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-089/SqlInjection.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-094/CodeInjection.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-117/LogInjection.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-134/TaintedFormatString.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-346/CorsMisconfigurationForCredentials.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-400/RemotePropertyInjection.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-502/UnsafeDeserialization.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-611/Xxe.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-643/XpathInjection.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-730/RegExpInjection.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-770/ResourceExhaustion.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-776/XmlBomb.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-807/ConditionalBypass.ql
ql/javascript/ql/src/experimental/heuristics/ql/src/Security/CWE-915/PrototypePollutingAssignment.ql
ql/javascript/ql/src/external/DuplicateFunction.ql
ql/javascript/ql/src/external/DuplicateToplevel.ql
ql/javascript/ql/src/external/SimilarFunction.ql
ql/javascript/ql/src/external/SimilarToplevel.ql
ql/javascript/ql/src/filters/ClassifyFiles.ql
ql/javascript/ql/src/meta/ApiGraphs/ApiGraphEdges.ql
ql/javascript/ql/src/meta/ApiGraphs/ApiGraphNodes.ql
ql/javascript/ql/src/meta/ApiGraphs/ApiGraphPointsToEdges.ql
ql/javascript/ql/src/meta/ApiGraphs/ApiGraphRhsNodes.ql
ql/javascript/ql/src/meta/ApiGraphs/ApiGraphUseNodes.ql
ql/javascript/ql/src/meta/Consistency.ql
ql/javascript/ql/src/meta/SSA/DeadDef.ql
ql/javascript/ql/src/meta/SSA/Dominance.ql
ql/javascript/ql/src/meta/SSA/MultipleDefs.ql
ql/javascript/ql/src/meta/SSA/MultipleRefinementInputs.ql
ql/javascript/ql/src/meta/SSA/NoDefs.ql
ql/javascript/ql/src/meta/SSA/NoPhiInputs.ql
ql/javascript/ql/src/meta/SSA/NoRefinementInputs.ql
ql/javascript/ql/src/meta/SSA/SinglePhiInput.ql
ql/javascript/ql/src/meta/alerts/CallGraph.ql
ql/javascript/ql/src/meta/alerts/ImportGraph.ql
ql/javascript/ql/src/meta/alerts/LibraryInputs.ql
ql/javascript/ql/src/meta/alerts/TaintSinks.ql
ql/javascript/ql/src/meta/alerts/TaintSources.ql
ql/javascript/ql/src/meta/alerts/TaintedNodes.ql
ql/javascript/ql/src/meta/alerts/ThreatModelSources.ql
ql/javascript/ql/src/meta/analysis-quality/CalledFunctionCandidates.ql
ql/javascript/ql/src/meta/analysis-quality/CalledFunctionRatio.ql
ql/javascript/ql/src/meta/analysis-quality/CalledFunctions.ql
ql/javascript/ql/src/meta/analysis-quality/DomValueRefs.ql
ql/javascript/ql/src/meta/analysis-quality/NumModules.ql
ql/javascript/ql/src/meta/analysis-quality/ResolvableCallCandidates.ql
ql/javascript/ql/src/meta/analysis-quality/ResolvableCallRatio.ql
ql/javascript/ql/src/meta/analysis-quality/ResolvableCalls.ql
ql/javascript/ql/src/meta/analysis-quality/ResolvableImports.ql
ql/javascript/ql/src/meta/analysis-quality/RouteHandlers.ql
ql/javascript/ql/src/meta/analysis-quality/SanitizersReachableFromSource.ql
ql/javascript/ql/src/meta/analysis-quality/SinksReachableFromSanitizer.ql
ql/javascript/ql/src/meta/analysis-quality/TaintSinks.ql
ql/javascript/ql/src/meta/analysis-quality/TaintSources.ql
ql/javascript/ql/src/meta/analysis-quality/TaintSteps.ql
ql/javascript/ql/src/meta/analysis-quality/TaintedNodes.ql
ql/javascript/ql/src/meta/analysis-quality/UncalledFunctions.ql
ql/javascript/ql/src/meta/analysis-quality/UnmodelledSteps.ql
ql/javascript/ql/src/meta/analysis-quality/UnpromotedRouteHandlerCandidate.ql
ql/javascript/ql/src/meta/analysis-quality/UnpromotedRouteSetupCandidate.ql
ql/javascript/ql/src/meta/analysis-quality/UnresolvableCalls.ql
ql/javascript/ql/src/meta/analysis-quality/UnresolvableImports.ql
ql/javascript/ql/src/meta/extraction-metrics/FileData.ql
ql/javascript/ql/src/meta/extraction-metrics/MissingMetrics.ql
ql/javascript/ql/src/meta/extraction-metrics/PhaseTimings.ql
ql/javascript/ql/src/meta/types/TypedExprs.ql
ql/javascript/ql/src/meta/types/TypesWithQualifiedName.ql

View File

@@ -0,0 +1,14 @@
import runs_on
import pytest
from query_suites import *
well_known_query_suites = ['javascript-code-quality.qls', 'javascript-security-and-quality.qls', 'javascript-security-extended.qls', 'javascript-code-scanning.qls']
@runs_on.posix
@pytest.mark.parametrize("query_suite", well_known_query_suites)
def test(codeql, javascript, check_query_suite, query_suite):
check_query_suite(query_suite)
@runs_on.posix
def test_not_included_queries(codeql, javascript, check_queries_not_included):
check_queries_not_included('javascript', well_known_query_suites)

View File

@@ -0,0 +1,30 @@
import os
import pytest
@pytest.fixture
def check_query_suite(codeql, cwd, expected_files, semmle_code_dir):
def ret(query_suite):
actual = codeql.resolve.queries(query_suite, _capture=True)
actual = sorted(actual.splitlines())
actual = [os.path.relpath(q, semmle_code_dir) for q in actual]
actual_file_name = query_suite + '.actual'
expected_files.add(actual_file_name)
(cwd / actual_file_name).write_text('\n'.join(actual) + '\n')
return ret
@pytest.fixture
def check_queries_not_included(codeql, cwd, expected_files, semmle_code_dir):
def ret(lang_folder_name, query_suites):
all_queries = codeql.resolve.queries(semmle_code_dir / 'ql' / lang_folder_name / 'ql' / 'src', _capture=True).splitlines()
included_in_qls = set()
for query_suite in query_suites:
included_in_qls |= set(codeql.resolve.queries(query_suite, _capture=True).strip().splitlines())
not_included = sorted(set(all_queries) - included_in_qls)
not_included = [os.path.relpath(q, semmle_code_dir) for q in not_included]
not_included_file_name = 'not_included_in_qls.actual'
expected_files.add(not_included_file_name)
(cwd / not_included_file_name).write_text('\n'.join(not_included) + '\n')
return ret

View File

@@ -0,0 +1,36 @@
ql/ruby/ql/src/AlertSuppression.ql
ql/ruby/ql/src/experimental/CWE-522-DecompressionBombs/DecompressionBombs.ql
ql/ruby/ql/src/experimental/cwe-022-zipslip/ZipSlip.ql
ql/ruby/ql/src/experimental/cwe-176/UnicodeBypassValidation.ql
ql/ruby/ql/src/experimental/cwe-208/UnsafeHmacComparison.ql
ql/ruby/ql/src/experimental/cwe-347/EmptyJWTSecret.ql
ql/ruby/ql/src/experimental/cwe-347/MissingJWTVerification.ql
ql/ruby/ql/src/experimental/cwe-502/UnsafeYamlDeserialization.ql
ql/ruby/ql/src/experimental/cwe-807/ConditionalBypass.ql
ql/ruby/ql/src/experimental/decompression-api/DecompressionApi.ql
ql/ruby/ql/src/experimental/improper-memoization/ImproperMemoization.ql
ql/ruby/ql/src/experimental/insecure-randomness/InsecureRandomness.ql
ql/ruby/ql/src/experimental/ldap-improper-auth/ImproperLdapAuth.ql
ql/ruby/ql/src/experimental/ldap-injection/LdapInjection.ql
ql/ruby/ql/src/experimental/manually-check-http-verb/ManuallyCheckHttpVerb.ql
ql/ruby/ql/src/experimental/performance/UseDetect.ql
ql/ruby/ql/src/experimental/template-injection/TemplateInjection.ql
ql/ruby/ql/src/experimental/weak-params/WeakParams.ql
ql/ruby/ql/src/experimental/xpath-injection/XpathInjection.ql
ql/ruby/ql/src/filters/ClassifyFiles.ql
ql/ruby/ql/src/queries/analysis/Definitions.ql
ql/ruby/ql/src/queries/diagnostics/PerformanceDiagnostics.ql
ql/ruby/ql/src/queries/meta/CallGraph.ql
ql/ruby/ql/src/queries/meta/SummarizedCallableCallSites.ql
ql/ruby/ql/src/queries/meta/TaintSinks.ql
ql/ruby/ql/src/queries/meta/TaintSources.ql
ql/ruby/ql/src/queries/meta/TaintedNodes.ql
ql/ruby/ql/src/queries/metrics/FLines.ql
ql/ruby/ql/src/queries/metrics/FLinesOfCode.ql
ql/ruby/ql/src/queries/metrics/FLinesOfComments.ql
ql/ruby/ql/src/queries/modeling/GenerateModel.ql
ql/ruby/ql/src/queries/security/cwe-732/WeakFilePermissions.ql
ql/ruby/ql/src/queries/variables/UnusedParameter.ql
ql/ruby/ql/src/utils/modeleditor/ApplicationModeEndpoints.ql
ql/ruby/ql/src/utils/modeleditor/FrameworkModeAccessPaths.ql
ql/ruby/ql/src/utils/modeleditor/FrameworkModeEndpoints.ql

View File

@@ -0,0 +1,3 @@
ql/ruby/ql/src/queries/performance/DatabaseQueryInLoop.ql
ql/ruby/ql/src/queries/variables/DeadStoreOfLocal.ql
ql/ruby/ql/src/queries/variables/UninitializedLocal.ql

View File

@@ -0,0 +1,44 @@
ql/ruby/ql/src/queries/diagnostics/ExtractedFiles.ql
ql/ruby/ql/src/queries/diagnostics/ExtractionErrors.ql
ql/ruby/ql/src/queries/diagnostics/ExtractionWarnings.ql
ql/ruby/ql/src/queries/security/cwe-020/IncompleteHostnameRegExp.ql
ql/ruby/ql/src/queries/security/cwe-020/IncompleteUrlSubstringSanitization.ql
ql/ruby/ql/src/queries/security/cwe-020/MissingFullAnchor.ql
ql/ruby/ql/src/queries/security/cwe-020/OverlyLargeRange.ql
ql/ruby/ql/src/queries/security/cwe-022/PathInjection.ql
ql/ruby/ql/src/queries/security/cwe-078/CommandInjection.ql
ql/ruby/ql/src/queries/security/cwe-078/KernelOpen.ql
ql/ruby/ql/src/queries/security/cwe-078/NonConstantKernelOpen.ql
ql/ruby/ql/src/queries/security/cwe-078/UnsafeShellCommandConstruction.ql
ql/ruby/ql/src/queries/security/cwe-079/ReflectedXSS.ql
ql/ruby/ql/src/queries/security/cwe-079/StoredXSS.ql
ql/ruby/ql/src/queries/security/cwe-079/UnsafeHtmlConstruction.ql
ql/ruby/ql/src/queries/security/cwe-089/SqlInjection.ql
ql/ruby/ql/src/queries/security/cwe-094/CodeInjection.ql
ql/ruby/ql/src/queries/security/cwe-116/BadTagFilter.ql
ql/ruby/ql/src/queries/security/cwe-116/IncompleteMultiCharacterSanitization.ql
ql/ruby/ql/src/queries/security/cwe-116/IncompleteSanitization.ql
ql/ruby/ql/src/queries/security/cwe-1333/PolynomialReDoS.ql
ql/ruby/ql/src/queries/security/cwe-1333/ReDoS.ql
ql/ruby/ql/src/queries/security/cwe-1333/RegExpInjection.ql
ql/ruby/ql/src/queries/security/cwe-134/TaintedFormatString.ql
ql/ruby/ql/src/queries/security/cwe-209/StackTraceExposure.ql
ql/ruby/ql/src/queries/security/cwe-300/InsecureDependencyResolution.ql
ql/ruby/ql/src/queries/security/cwe-312/CleartextLogging.ql
ql/ruby/ql/src/queries/security/cwe-312/CleartextStorage.ql
ql/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.ql
ql/ruby/ql/src/queries/security/cwe-327/WeakSensitiveDataHashing.ql
ql/ruby/ql/src/queries/security/cwe-352/CSRFProtectionDisabled.ql
ql/ruby/ql/src/queries/security/cwe-352/CSRFProtectionNotEnabled.ql
ql/ruby/ql/src/queries/security/cwe-502/UnsafeDeserialization.ql
ql/ruby/ql/src/queries/security/cwe-598/SensitiveGetQuery.ql
ql/ruby/ql/src/queries/security/cwe-601/UrlRedirect.ql
ql/ruby/ql/src/queries/security/cwe-611/Xxe.ql
ql/ruby/ql/src/queries/security/cwe-732/WeakCookieConfiguration.ql
ql/ruby/ql/src/queries/security/cwe-829/InsecureDownload.ql
ql/ruby/ql/src/queries/security/cwe-915/MassAssignment.ql
ql/ruby/ql/src/queries/security/cwe-918/ServerSideRequestForgery.ql
ql/ruby/ql/src/queries/summary/LinesOfCode.ql
ql/ruby/ql/src/queries/summary/LinesOfUserCode.ql
ql/ruby/ql/src/queries/summary/NumberOfFilesExtractedWithErrors.ql
ql/ruby/ql/src/queries/summary/NumberOfSuccessfullyExtractedFiles.ql

View File

@@ -0,0 +1,54 @@
ql/ruby/ql/src/queries/diagnostics/ExtractedFiles.ql
ql/ruby/ql/src/queries/diagnostics/ExtractionErrors.ql
ql/ruby/ql/src/queries/diagnostics/ExtractionWarnings.ql
ql/ruby/ql/src/queries/performance/DatabaseQueryInLoop.ql
ql/ruby/ql/src/queries/security/cwe-020/IncompleteHostnameRegExp.ql
ql/ruby/ql/src/queries/security/cwe-020/IncompleteUrlSubstringSanitization.ql
ql/ruby/ql/src/queries/security/cwe-020/MissingFullAnchor.ql
ql/ruby/ql/src/queries/security/cwe-020/MissingRegExpAnchor.ql
ql/ruby/ql/src/queries/security/cwe-020/OverlyLargeRange.ql
ql/ruby/ql/src/queries/security/cwe-022/PathInjection.ql
ql/ruby/ql/src/queries/security/cwe-078/CommandInjection.ql
ql/ruby/ql/src/queries/security/cwe-078/KernelOpen.ql
ql/ruby/ql/src/queries/security/cwe-078/NonConstantKernelOpen.ql
ql/ruby/ql/src/queries/security/cwe-078/UnsafeShellCommandConstruction.ql
ql/ruby/ql/src/queries/security/cwe-079/ReflectedXSS.ql
ql/ruby/ql/src/queries/security/cwe-079/StoredXSS.ql
ql/ruby/ql/src/queries/security/cwe-079/UnsafeHtmlConstruction.ql
ql/ruby/ql/src/queries/security/cwe-089/SqlInjection.ql
ql/ruby/ql/src/queries/security/cwe-094/CodeInjection.ql
ql/ruby/ql/src/queries/security/cwe-094/UnsafeCodeConstruction.ql
ql/ruby/ql/src/queries/security/cwe-116/BadTagFilter.ql
ql/ruby/ql/src/queries/security/cwe-116/IncompleteMultiCharacterSanitization.ql
ql/ruby/ql/src/queries/security/cwe-116/IncompleteSanitization.ql
ql/ruby/ql/src/queries/security/cwe-117/LogInjection.ql
ql/ruby/ql/src/queries/security/cwe-1333/PolynomialReDoS.ql
ql/ruby/ql/src/queries/security/cwe-1333/ReDoS.ql
ql/ruby/ql/src/queries/security/cwe-1333/RegExpInjection.ql
ql/ruby/ql/src/queries/security/cwe-134/TaintedFormatString.ql
ql/ruby/ql/src/queries/security/cwe-209/StackTraceExposure.ql
ql/ruby/ql/src/queries/security/cwe-295/RequestWithoutValidation.ql
ql/ruby/ql/src/queries/security/cwe-300/InsecureDependencyResolution.ql
ql/ruby/ql/src/queries/security/cwe-312/CleartextLogging.ql
ql/ruby/ql/src/queries/security/cwe-312/CleartextStorage.ql
ql/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.ql
ql/ruby/ql/src/queries/security/cwe-327/WeakSensitiveDataHashing.ql
ql/ruby/ql/src/queries/security/cwe-352/CSRFProtectionDisabled.ql
ql/ruby/ql/src/queries/security/cwe-352/CSRFProtectionNotEnabled.ql
ql/ruby/ql/src/queries/security/cwe-502/UnsafeDeserialization.ql
ql/ruby/ql/src/queries/security/cwe-506/HardcodedDataInterpretedAsCode.ql
ql/ruby/ql/src/queries/security/cwe-598/SensitiveGetQuery.ql
ql/ruby/ql/src/queries/security/cwe-601/UrlRedirect.ql
ql/ruby/ql/src/queries/security/cwe-611/Xxe.ql
ql/ruby/ql/src/queries/security/cwe-732/WeakCookieConfiguration.ql
ql/ruby/ql/src/queries/security/cwe-798/HardcodedCredentials.ql
ql/ruby/ql/src/queries/security/cwe-829/InsecureDownload.ql
ql/ruby/ql/src/queries/security/cwe-912/HttpToFileAccess.ql
ql/ruby/ql/src/queries/security/cwe-915/MassAssignment.ql
ql/ruby/ql/src/queries/security/cwe-918/ServerSideRequestForgery.ql
ql/ruby/ql/src/queries/summary/LinesOfCode.ql
ql/ruby/ql/src/queries/summary/LinesOfUserCode.ql
ql/ruby/ql/src/queries/summary/NumberOfFilesExtractedWithErrors.ql
ql/ruby/ql/src/queries/summary/NumberOfSuccessfullyExtractedFiles.ql
ql/ruby/ql/src/queries/variables/DeadStoreOfLocal.ql
ql/ruby/ql/src/queries/variables/UninitializedLocal.ql

View File

@@ -0,0 +1,51 @@
ql/ruby/ql/src/queries/diagnostics/ExtractedFiles.ql
ql/ruby/ql/src/queries/diagnostics/ExtractionErrors.ql
ql/ruby/ql/src/queries/diagnostics/ExtractionWarnings.ql
ql/ruby/ql/src/queries/security/cwe-020/IncompleteHostnameRegExp.ql
ql/ruby/ql/src/queries/security/cwe-020/IncompleteUrlSubstringSanitization.ql
ql/ruby/ql/src/queries/security/cwe-020/MissingFullAnchor.ql
ql/ruby/ql/src/queries/security/cwe-020/MissingRegExpAnchor.ql
ql/ruby/ql/src/queries/security/cwe-020/OverlyLargeRange.ql
ql/ruby/ql/src/queries/security/cwe-022/PathInjection.ql
ql/ruby/ql/src/queries/security/cwe-078/CommandInjection.ql
ql/ruby/ql/src/queries/security/cwe-078/KernelOpen.ql
ql/ruby/ql/src/queries/security/cwe-078/NonConstantKernelOpen.ql
ql/ruby/ql/src/queries/security/cwe-078/UnsafeShellCommandConstruction.ql
ql/ruby/ql/src/queries/security/cwe-079/ReflectedXSS.ql
ql/ruby/ql/src/queries/security/cwe-079/StoredXSS.ql
ql/ruby/ql/src/queries/security/cwe-079/UnsafeHtmlConstruction.ql
ql/ruby/ql/src/queries/security/cwe-089/SqlInjection.ql
ql/ruby/ql/src/queries/security/cwe-094/CodeInjection.ql
ql/ruby/ql/src/queries/security/cwe-094/UnsafeCodeConstruction.ql
ql/ruby/ql/src/queries/security/cwe-116/BadTagFilter.ql
ql/ruby/ql/src/queries/security/cwe-116/IncompleteMultiCharacterSanitization.ql
ql/ruby/ql/src/queries/security/cwe-116/IncompleteSanitization.ql
ql/ruby/ql/src/queries/security/cwe-117/LogInjection.ql
ql/ruby/ql/src/queries/security/cwe-1333/PolynomialReDoS.ql
ql/ruby/ql/src/queries/security/cwe-1333/ReDoS.ql
ql/ruby/ql/src/queries/security/cwe-1333/RegExpInjection.ql
ql/ruby/ql/src/queries/security/cwe-134/TaintedFormatString.ql
ql/ruby/ql/src/queries/security/cwe-209/StackTraceExposure.ql
ql/ruby/ql/src/queries/security/cwe-295/RequestWithoutValidation.ql
ql/ruby/ql/src/queries/security/cwe-300/InsecureDependencyResolution.ql
ql/ruby/ql/src/queries/security/cwe-312/CleartextLogging.ql
ql/ruby/ql/src/queries/security/cwe-312/CleartextStorage.ql
ql/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.ql
ql/ruby/ql/src/queries/security/cwe-327/WeakSensitiveDataHashing.ql
ql/ruby/ql/src/queries/security/cwe-352/CSRFProtectionDisabled.ql
ql/ruby/ql/src/queries/security/cwe-352/CSRFProtectionNotEnabled.ql
ql/ruby/ql/src/queries/security/cwe-502/UnsafeDeserialization.ql
ql/ruby/ql/src/queries/security/cwe-506/HardcodedDataInterpretedAsCode.ql
ql/ruby/ql/src/queries/security/cwe-598/SensitiveGetQuery.ql
ql/ruby/ql/src/queries/security/cwe-601/UrlRedirect.ql
ql/ruby/ql/src/queries/security/cwe-611/Xxe.ql
ql/ruby/ql/src/queries/security/cwe-732/WeakCookieConfiguration.ql
ql/ruby/ql/src/queries/security/cwe-798/HardcodedCredentials.ql
ql/ruby/ql/src/queries/security/cwe-829/InsecureDownload.ql
ql/ruby/ql/src/queries/security/cwe-912/HttpToFileAccess.ql
ql/ruby/ql/src/queries/security/cwe-915/MassAssignment.ql
ql/ruby/ql/src/queries/security/cwe-918/ServerSideRequestForgery.ql
ql/ruby/ql/src/queries/summary/LinesOfCode.ql
ql/ruby/ql/src/queries/summary/LinesOfUserCode.ql
ql/ruby/ql/src/queries/summary/NumberOfFilesExtractedWithErrors.ql
ql/ruby/ql/src/queries/summary/NumberOfSuccessfullyExtractedFiles.ql

View File

@@ -0,0 +1,14 @@
import runs_on
import pytest
from query_suites import *
well_known_query_suites = ['ruby-code-quality.qls', 'ruby-security-and-quality.qls', 'ruby-security-extended.qls', 'ruby-code-scanning.qls']
@runs_on.posix
@pytest.mark.parametrize("query_suite", well_known_query_suites)
def test(codeql, ruby, check_query_suite, query_suite):
check_query_suite(query_suite)
@runs_on.posix
def test_not_included_queries(codeql, ruby, check_queries_not_included):
check_queries_not_included('ruby', well_known_query_suites)

View File

@@ -0,0 +1,16 @@
ql/rust/ql/src/queries/summary/CryptographicOperations.ql
ql/rust/ql/src/queries/summary/LinesOfUserCodeInFiles.ql
ql/rust/ql/src/queries/summary/QuerySinks.ql
ql/rust/ql/src/queries/summary/SensitiveData.ql
ql/rust/ql/src/queries/summary/TaintSources.ql
ql/rust/ql/src/queries/unusedentities/UnreachableCode.ql
ql/rust/ql/src/queries/unusedentities/UnusedValue.ql
ql/rust/ql/src/utils/modelgenerator/CaptureContentSummaryModels.ql
ql/rust/ql/src/utils/modelgenerator/CaptureMixedNeutralModels.ql
ql/rust/ql/src/utils/modelgenerator/CaptureMixedSummaryModels.ql
ql/rust/ql/src/utils/modelgenerator/CaptureNeutralModels.ql
ql/rust/ql/src/utils/modelgenerator/CaptureSinkModels.ql
ql/rust/ql/src/utils/modelgenerator/CaptureSourceModels.ql
ql/rust/ql/src/utils/modelgenerator/CaptureSummaryModels.ql
ql/rust/ql/src/utils/modelgenerator/debug/CaptureSummaryModelsPartialPath.ql
ql/rust/ql/src/utils/modelgenerator/debug/CaptureSummaryModelsPath.ql

View File

@@ -0,0 +1,26 @@
ql/rust/ql/src/queries/diagnostics/AstConsistencyCounts.ql
ql/rust/ql/src/queries/diagnostics/CfgConsistencyCounts.ql
ql/rust/ql/src/queries/diagnostics/DataFlowConsistencyCounts.ql
ql/rust/ql/src/queries/diagnostics/ExtractedFiles.ql
ql/rust/ql/src/queries/diagnostics/ExtractionErrors.ql
ql/rust/ql/src/queries/diagnostics/ExtractionWarnings.ql
ql/rust/ql/src/queries/diagnostics/SsaConsistencyCounts.ql
ql/rust/ql/src/queries/diagnostics/UnextractedElements.ql
ql/rust/ql/src/queries/diagnostics/UnresolvedMacroCalls.ql
ql/rust/ql/src/queries/security/CWE-020/RegexInjection.ql
ql/rust/ql/src/queries/security/CWE-022/TaintedPath.ql
ql/rust/ql/src/queries/security/CWE-089/SqlInjection.ql
ql/rust/ql/src/queries/security/CWE-311/CleartextTransmission.ql
ql/rust/ql/src/queries/security/CWE-312/CleartextLogging.ql
ql/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.ql
ql/rust/ql/src/queries/security/CWE-328/WeakSensitiveDataHashing.ql
ql/rust/ql/src/queries/security/CWE-825/AccessInvalidPointer.ql
ql/rust/ql/src/queries/summary/LinesOfCode.ql
ql/rust/ql/src/queries/summary/LinesOfUserCode.ql
ql/rust/ql/src/queries/summary/NumberOfFilesExtractedWithErrors.ql
ql/rust/ql/src/queries/summary/NumberOfSuccessfullyExtractedFiles.ql
ql/rust/ql/src/queries/summary/QuerySinkCounts.ql
ql/rust/ql/src/queries/summary/SummaryStats.ql
ql/rust/ql/src/queries/summary/SummaryStatsReduced.ql
ql/rust/ql/src/queries/telemetry/DatabaseQualityDiagnostics.ql
ql/rust/ql/src/queries/telemetry/ExtractorInformation.ql

View File

@@ -0,0 +1,29 @@
ql/rust/ql/src/queries/diagnostics/AstConsistencyCounts.ql
ql/rust/ql/src/queries/diagnostics/CfgConsistencyCounts.ql
ql/rust/ql/src/queries/diagnostics/DataFlowConsistencyCounts.ql
ql/rust/ql/src/queries/diagnostics/ExtractedFiles.ql
ql/rust/ql/src/queries/diagnostics/ExtractionErrors.ql
ql/rust/ql/src/queries/diagnostics/ExtractionWarnings.ql
ql/rust/ql/src/queries/diagnostics/SsaConsistencyCounts.ql
ql/rust/ql/src/queries/diagnostics/UnextractedElements.ql
ql/rust/ql/src/queries/diagnostics/UnresolvedMacroCalls.ql
ql/rust/ql/src/queries/security/CWE-020/RegexInjection.ql
ql/rust/ql/src/queries/security/CWE-022/TaintedPath.ql
ql/rust/ql/src/queries/security/CWE-089/SqlInjection.ql
ql/rust/ql/src/queries/security/CWE-311/CleartextTransmission.ql
ql/rust/ql/src/queries/security/CWE-312/CleartextLogging.ql
ql/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.ql
ql/rust/ql/src/queries/security/CWE-328/WeakSensitiveDataHashing.ql
ql/rust/ql/src/queries/security/CWE-696/BadCtorInitialization.ql
ql/rust/ql/src/queries/security/CWE-770/UncontrolledAllocationSize.ql
ql/rust/ql/src/queries/security/CWE-825/AccessInvalidPointer.ql
ql/rust/ql/src/queries/summary/LinesOfCode.ql
ql/rust/ql/src/queries/summary/LinesOfUserCode.ql
ql/rust/ql/src/queries/summary/NumberOfFilesExtractedWithErrors.ql
ql/rust/ql/src/queries/summary/NumberOfSuccessfullyExtractedFiles.ql
ql/rust/ql/src/queries/summary/QuerySinkCounts.ql
ql/rust/ql/src/queries/summary/SummaryStats.ql
ql/rust/ql/src/queries/summary/SummaryStatsReduced.ql
ql/rust/ql/src/queries/telemetry/DatabaseQualityDiagnostics.ql
ql/rust/ql/src/queries/telemetry/ExtractorInformation.ql
ql/rust/ql/src/queries/unusedentities/UnusedVariable.ql

View File

@@ -0,0 +1,27 @@
ql/rust/ql/src/queries/diagnostics/AstConsistencyCounts.ql
ql/rust/ql/src/queries/diagnostics/CfgConsistencyCounts.ql
ql/rust/ql/src/queries/diagnostics/DataFlowConsistencyCounts.ql
ql/rust/ql/src/queries/diagnostics/ExtractedFiles.ql
ql/rust/ql/src/queries/diagnostics/ExtractionErrors.ql
ql/rust/ql/src/queries/diagnostics/ExtractionWarnings.ql
ql/rust/ql/src/queries/diagnostics/SsaConsistencyCounts.ql
ql/rust/ql/src/queries/diagnostics/UnextractedElements.ql
ql/rust/ql/src/queries/diagnostics/UnresolvedMacroCalls.ql
ql/rust/ql/src/queries/security/CWE-020/RegexInjection.ql
ql/rust/ql/src/queries/security/CWE-022/TaintedPath.ql
ql/rust/ql/src/queries/security/CWE-089/SqlInjection.ql
ql/rust/ql/src/queries/security/CWE-311/CleartextTransmission.ql
ql/rust/ql/src/queries/security/CWE-312/CleartextLogging.ql
ql/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.ql
ql/rust/ql/src/queries/security/CWE-328/WeakSensitiveDataHashing.ql
ql/rust/ql/src/queries/security/CWE-770/UncontrolledAllocationSize.ql
ql/rust/ql/src/queries/security/CWE-825/AccessInvalidPointer.ql
ql/rust/ql/src/queries/summary/LinesOfCode.ql
ql/rust/ql/src/queries/summary/LinesOfUserCode.ql
ql/rust/ql/src/queries/summary/NumberOfFilesExtractedWithErrors.ql
ql/rust/ql/src/queries/summary/NumberOfSuccessfullyExtractedFiles.ql
ql/rust/ql/src/queries/summary/QuerySinkCounts.ql
ql/rust/ql/src/queries/summary/SummaryStats.ql
ql/rust/ql/src/queries/summary/SummaryStatsReduced.ql
ql/rust/ql/src/queries/telemetry/DatabaseQualityDiagnostics.ql
ql/rust/ql/src/queries/telemetry/ExtractorInformation.ql

View File

@@ -0,0 +1,14 @@
import runs_on
import pytest
from query_suites import *
well_known_query_suites = ['rust-code-quality.qls', 'rust-security-and-quality.qls', 'rust-security-extended.qls', 'rust-code-scanning.qls']
@runs_on.posix
@pytest.mark.parametrize("query_suite", well_known_query_suites)
def test(codeql, rust, check_query_suite, query_suite):
check_query_suite(query_suite)
@runs_on.posix
def test_not_included_queries(codeql, rust, check_queries_not_included):
check_queries_not_included('rust', well_known_query_suites)

View File

@@ -0,0 +1,9 @@
ql/swift/ql/src/AlertSuppression.ql
ql/swift/ql/src/experimental/Security/CWE-022/UnsafeUnpack.ql
ql/swift/ql/src/queries/Summary/FlowSources.ql
ql/swift/ql/src/queries/Summary/QuerySinks.ql
ql/swift/ql/src/queries/Summary/RegexEvals.ql
ql/swift/ql/src/queries/Summary/SensitiveExprs.ql
ql/swift/ql/src/queries/Summary/SummaryStats.ql
ql/swift/ql/src/queries/Summary/TaintReach.ql
ql/swift/ql/src/queries/ide-contextual-queries/printAst.ql

View File

@@ -0,0 +1,31 @@
ql/swift/ql/src/diagnostics/ExtractedFiles.ql
ql/swift/ql/src/diagnostics/SuccessfullyExtractedLines.ql
ql/swift/ql/src/diagnostics/internal/AstNodes.ql
ql/swift/ql/src/diagnostics/internal/ExtractionErrors.ql
ql/swift/ql/src/diagnostics/internal/UnresolvedAstNodes.ql
ql/swift/ql/src/queries/Security/CWE-020/IncompleteHostnameRegex.ql
ql/swift/ql/src/queries/Security/CWE-020/MissingRegexAnchor.ql
ql/swift/ql/src/queries/Security/CWE-022/PathInjection.ql
ql/swift/ql/src/queries/Security/CWE-078/CommandInjection.ql
ql/swift/ql/src/queries/Security/CWE-079/UnsafeWebViewFetch.ql
ql/swift/ql/src/queries/Security/CWE-089/SqlInjection.ql
ql/swift/ql/src/queries/Security/CWE-116/BadTagFilter.ql
ql/swift/ql/src/queries/Security/CWE-1204/StaticInitializationVector.ql
ql/swift/ql/src/queries/Security/CWE-1333/ReDoS.ql
ql/swift/ql/src/queries/Security/CWE-134/UncontrolledFormatString.ql
ql/swift/ql/src/queries/Security/CWE-135/StringLengthConflation.ql
ql/swift/ql/src/queries/Security/CWE-259/ConstantPassword.ql
ql/swift/ql/src/queries/Security/CWE-311/CleartextStorageDatabase.ql
ql/swift/ql/src/queries/Security/CWE-311/CleartextTransmission.ql
ql/swift/ql/src/queries/Security/CWE-312/CleartextLogging.ql
ql/swift/ql/src/queries/Security/CWE-312/CleartextStoragePreferences.ql
ql/swift/ql/src/queries/Security/CWE-321/HardcodedEncryptionKey.ql
ql/swift/ql/src/queries/Security/CWE-327/ECBEncryption.ql
ql/swift/ql/src/queries/Security/CWE-328/WeakPasswordHashing.ql
ql/swift/ql/src/queries/Security/CWE-328/WeakSensitiveDataHashing.ql
ql/swift/ql/src/queries/Security/CWE-611/XXE.ql
ql/swift/ql/src/queries/Security/CWE-730/RegexInjection.ql
ql/swift/ql/src/queries/Security/CWE-757/InsecureTLS.ql
ql/swift/ql/src/queries/Security/CWE-760/ConstantSalt.ql
ql/swift/ql/src/queries/Security/CWE-916/InsufficientHashIterations.ql
ql/swift/ql/src/queries/Security/CWE-943/PredicateInjection.ql

View File

@@ -0,0 +1,32 @@
ql/swift/ql/src/diagnostics/ExtractedFiles.ql
ql/swift/ql/src/diagnostics/SuccessfullyExtractedLines.ql
ql/swift/ql/src/diagnostics/internal/AstNodes.ql
ql/swift/ql/src/diagnostics/internal/ExtractionErrors.ql
ql/swift/ql/src/diagnostics/internal/UnresolvedAstNodes.ql
ql/swift/ql/src/queries/Security/CWE-020/IncompleteHostnameRegex.ql
ql/swift/ql/src/queries/Security/CWE-020/MissingRegexAnchor.ql
ql/swift/ql/src/queries/Security/CWE-022/PathInjection.ql
ql/swift/ql/src/queries/Security/CWE-078/CommandInjection.ql
ql/swift/ql/src/queries/Security/CWE-079/UnsafeWebViewFetch.ql
ql/swift/ql/src/queries/Security/CWE-089/SqlInjection.ql
ql/swift/ql/src/queries/Security/CWE-094/UnsafeJsEval.ql
ql/swift/ql/src/queries/Security/CWE-116/BadTagFilter.ql
ql/swift/ql/src/queries/Security/CWE-1204/StaticInitializationVector.ql
ql/swift/ql/src/queries/Security/CWE-1333/ReDoS.ql
ql/swift/ql/src/queries/Security/CWE-134/UncontrolledFormatString.ql
ql/swift/ql/src/queries/Security/CWE-135/StringLengthConflation.ql
ql/swift/ql/src/queries/Security/CWE-259/ConstantPassword.ql
ql/swift/ql/src/queries/Security/CWE-311/CleartextStorageDatabase.ql
ql/swift/ql/src/queries/Security/CWE-311/CleartextTransmission.ql
ql/swift/ql/src/queries/Security/CWE-312/CleartextLogging.ql
ql/swift/ql/src/queries/Security/CWE-312/CleartextStoragePreferences.ql
ql/swift/ql/src/queries/Security/CWE-321/HardcodedEncryptionKey.ql
ql/swift/ql/src/queries/Security/CWE-327/ECBEncryption.ql
ql/swift/ql/src/queries/Security/CWE-328/WeakPasswordHashing.ql
ql/swift/ql/src/queries/Security/CWE-328/WeakSensitiveDataHashing.ql
ql/swift/ql/src/queries/Security/CWE-611/XXE.ql
ql/swift/ql/src/queries/Security/CWE-730/RegexInjection.ql
ql/swift/ql/src/queries/Security/CWE-757/InsecureTLS.ql
ql/swift/ql/src/queries/Security/CWE-760/ConstantSalt.ql
ql/swift/ql/src/queries/Security/CWE-916/InsufficientHashIterations.ql
ql/swift/ql/src/queries/Security/CWE-943/PredicateInjection.ql

View File

@@ -0,0 +1,32 @@
ql/swift/ql/src/diagnostics/ExtractedFiles.ql
ql/swift/ql/src/diagnostics/SuccessfullyExtractedLines.ql
ql/swift/ql/src/diagnostics/internal/AstNodes.ql
ql/swift/ql/src/diagnostics/internal/ExtractionErrors.ql
ql/swift/ql/src/diagnostics/internal/UnresolvedAstNodes.ql
ql/swift/ql/src/queries/Security/CWE-020/IncompleteHostnameRegex.ql
ql/swift/ql/src/queries/Security/CWE-020/MissingRegexAnchor.ql
ql/swift/ql/src/queries/Security/CWE-022/PathInjection.ql
ql/swift/ql/src/queries/Security/CWE-078/CommandInjection.ql
ql/swift/ql/src/queries/Security/CWE-079/UnsafeWebViewFetch.ql
ql/swift/ql/src/queries/Security/CWE-089/SqlInjection.ql
ql/swift/ql/src/queries/Security/CWE-094/UnsafeJsEval.ql
ql/swift/ql/src/queries/Security/CWE-116/BadTagFilter.ql
ql/swift/ql/src/queries/Security/CWE-1204/StaticInitializationVector.ql
ql/swift/ql/src/queries/Security/CWE-1333/ReDoS.ql
ql/swift/ql/src/queries/Security/CWE-134/UncontrolledFormatString.ql
ql/swift/ql/src/queries/Security/CWE-135/StringLengthConflation.ql
ql/swift/ql/src/queries/Security/CWE-259/ConstantPassword.ql
ql/swift/ql/src/queries/Security/CWE-311/CleartextStorageDatabase.ql
ql/swift/ql/src/queries/Security/CWE-311/CleartextTransmission.ql
ql/swift/ql/src/queries/Security/CWE-312/CleartextLogging.ql
ql/swift/ql/src/queries/Security/CWE-312/CleartextStoragePreferences.ql
ql/swift/ql/src/queries/Security/CWE-321/HardcodedEncryptionKey.ql
ql/swift/ql/src/queries/Security/CWE-327/ECBEncryption.ql
ql/swift/ql/src/queries/Security/CWE-328/WeakPasswordHashing.ql
ql/swift/ql/src/queries/Security/CWE-328/WeakSensitiveDataHashing.ql
ql/swift/ql/src/queries/Security/CWE-611/XXE.ql
ql/swift/ql/src/queries/Security/CWE-730/RegexInjection.ql
ql/swift/ql/src/queries/Security/CWE-757/InsecureTLS.ql
ql/swift/ql/src/queries/Security/CWE-760/ConstantSalt.ql
ql/swift/ql/src/queries/Security/CWE-916/InsufficientHashIterations.ql
ql/swift/ql/src/queries/Security/CWE-943/PredicateInjection.ql

View File

@@ -0,0 +1,14 @@
import runs_on
import pytest
from query_suites import *
well_known_query_suites = ['swift-code-quality.qls', 'swift-security-and-quality.qls', 'swift-security-extended.qls', 'swift-code-scanning.qls']
@runs_on.posix
@pytest.mark.parametrize("query_suite", well_known_query_suites)
def test(codeql, swift, check_query_suite, query_suite):
check_query_suite(query_suite)
@runs_on.posix
def test_not_included_queries(codeql, swift, check_queries_not_included):
check_queries_not_included('swift', well_known_query_suites)