-
-
Notifications
You must be signed in to change notification settings - Fork 778
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Analysis for CodeQL query Inclusion of functionality from an untrusted source
#5297
Comments
This comment was marked as outdated.
This comment was marked as outdated.
Hi @freaky4wrld, thank you for taking up this issue! Hfla appreciates you :) Do let fellow developers know about your:- You're awesome! P.S. - You may not take up another issue until this issue gets merged (or closed). Thanks again :) |
ETA - 12/11/23 EOD |
I'm just not sure with the |
@roslynwythe the issue is complete and need to reviewed.... if anything has to be changed please tag me here |
Hi @freaky4wrld Thank you for the analysis and recommendations. Based on your recommendations, we will create two new issues for the code changes to the files, and in each case we need to ask the developer to do some sort of testing to make sure nothing was broken. I will use the information you provide in Let me ask you, if you were responsible for making the recommeded code changes, how would you test them? If that babel script failed to load, how would we know? |
@roslynwythe well there could be various methods:
|
Thank you @freaky4wrld for your analysis and recommendations regarding this security alert. This issue will be closed as completed. A follow-up issue will be created for the code change and testing. If you have an interest in writing that issue, please let me know via DM on Slack. |
Prerequisite
Overview
We need to analyze the query
Inclusion of functionality from an untrusted source
which appears in the CodeQL code scan results, and we need to make recommendations about the disposition of each specific alert found with that query. Analysis and Recommendations will be recorded in the spreadsheet: HfLA website: CodeQL scan alerts (issue #5060)1Action Items
Inclusion of functionality from an untrusted source
. Copy the query, severity level, description, and recommendation text from the webpage into a new row in theCodeQL query types
sheet.security
is listed, check the "Security Alert?" column of the spreadsheet.dismiss as test
,dismiss as false positive
,dismiss as won't fix
,change code
, orvaries by instance
Alert Instances
sheet for each alert instance in the code scanning results page2; Complete thequery
,alert #
andfile:line
columnsfix code
, populate these columns:Line of current code
Recommended line of code
web page
- URL of the affected web page, for testing purposestest procedure
- describe the process which can be used after the code fix has been made, to check that the change has not broken anything.ready for dev lead
label to this issue and move it to theQuestions/In Review column
For merge team/dev lead
CodeQL query types
sheet. All columns should be populated.Alert Instances
. There should be a row for each instance of the alert in the code scanning results page2. For each row:change code
, all columns must be completed with the exception ofLink to Issue
ready for dev lead
label and close the issueResources/Instructions
Footnotes
spreadsheet: HfLA website: CodeQL scan alerts - issue #5060 ↩ ↩2
Code scanning results page ↩ ↩2 ↩3
The text was updated successfully, but these errors were encountered: