@@ -24,14 +24,14 @@ jobs:
24
24
- name : Initialize CodeQL
25
25
uses : github/codeql-action/init@v3
26
26
with :
27
- languages : javascript # Adjust as needed (python, java, go, etc.)
27
+ languages : javascript # Adjust based on your repo's language
28
28
29
29
- name : Run CodeQL Custom Queries
30
30
uses : github/codeql-action/analyze@v3
31
31
with :
32
- category : " custom-query-analysis" # Unique category for this analyze action
33
- queries : .github/queries # Ensure this path is correct
34
- output : ./results/security-results.sarif # Explicit output path for SARIF file
32
+ category : " custom-query-analysis" # Unique category for analyze step
33
+ queries : .github/queries # Path to your custom queries
34
+ output : ./results/security-results.sarif # Explicit output location for SARIF file
35
35
36
36
# ✅ Debug Step: Verify Output Directory and File
37
37
- name : List files in results directory
@@ -41,22 +41,23 @@ jobs:
41
41
- name : Find SARIF Files
42
42
run : find . -name "*.sarif" || echo "No SARIF files found"
43
43
44
- # ✅ Upload CodeQL SARIF Results (Use a Different Category )
44
+ # ✅ Upload CodeQL SARIF Results (With unique category )
45
45
- name : Upload CodeQL SARIF Results
46
46
uses : actions/upload-artifact@v4
47
47
with :
48
48
name : codeql-custom-results
49
49
path : ./results/security-results.sarif
50
50
51
- # ✅ Upload SARIF to GitHub Security Alerts (Unique category for upload )
51
+ # ✅ Upload SARIF to GitHub Security Alerts (With a different unique category )
52
52
- name : Upload SARIF to GitHub Security Tab
53
53
uses : github/codeql-action/upload-sarif@v3
54
54
with :
55
- category : " custom-query-upload" # Unique category for the upload step
55
+ category : " custom-query-upload" # Ensure this category is unique
56
56
sarif_file : ./results/security-results.sarif
57
57
58
58
59
59
60
+
60
61
61
62
62
63
0 commit comments