The default.yml
configuration is the default config file used to make it easy to use the CodeQL Community Packs. The queries included here are pulled in from the language default suites
automatically when referencing the community packs. The default suites as specified in each language's {LANG}/src/qlpack.yml
. The standard configuration is:
defaultSuiteFile: suites/{LANG}.qls
The audit.yml
configuration is used primarily to conduct a security assessment of potentially vulnerable code, by running a number of audit queries with CodeQL. Many of these queries operate on partial path queries, thus not seeking complete source/sink flows. Use these wide-ranging queries or partial flow paths as tools to infer potential taint disruptions and identify opportunities for customization improvements.
These are based on the suite in each language suites folder called {LANG}-audit.qls
Note
Current Ruby and Swift are not supported
This synthetics.yml
configuration is intended for analyzing synthetic (intentionally vulnerable) code samples for vulnerabilities. This configuration uses all possible security queries/extensions from the CodeQL built in packs, the CodeQL Community Packs, and additional OSS packs. It also includes the queries from the built-in security-experimental.qls
suite with additional lower precision/experimental queries:
- queries marked as
@precision: low
or missing a precision - queries marked as
@problem.severity: recommendation
- queries in
\experimental\
folders
This configuration will provide a more thorough analysis at the cost of longer analysis times and potential false positives. Consider using the audit.yml
configuration to look for additional false negative scenarios.