CodeQL is the static analysis engine behind GitHub code scanning, which finds and remediates security issues in your code. We’ve recently released version 2.21.1 of CodeQL. Here’s what’s new and improved in this release.
GitHub Actions
- This CodeQL release coincides with the general availability of support for analyzing GitHub Actions workflows. Learn more in the dedicated changelog post.
- We’ve improved alert fix suggestions for the
actions/missing-workflow-permissions
query, making it easier for you to resolve alerts.
JavaScript/TypeScript
- We’ve added new detections of sources and sinks in Next.js and DOM element references, improving the detection of XSS issues.
- We’ve enhanced path injection detection for several additional methods.
- We’ve fixed an issue where
tsconfig.json
files containing array literals and trailing commas weren’t correctly extracted.
Ruby
- We’ve improved the
rb/useless-assignment-to-local
query, so you’ll see fewer false positives and will get helpful documentation for alerts. - The
rb/uninitialized-local-variable
query now only generates an alert when a variable is used as a method call receiver. This should reduce noise. In addition, new help content is available for this query. - Calls to
super
without explicit arguments now have their implicit arguments generated, resulting in more accurate analysis.
C/C++
- Calling conventions like
__cdecl
,__stdcall
, and__fastcall
are now represented in the CodeQL database as a newCallingConventionSpecifier
, making function analysis more precise.
For a full list of changes, check out the complete changelog for version 2.21.1. Every new version of CodeQL is automatically deployed to users of GitHub code scanning on github.com. The new functionality in CodeQL 2.21.1 will also be included in GitHub Enterprise Server (GHES) version 3.18. If you’re using an older version of GHES, you can manually upgrade your CodeQL version.