You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Changing this default requires security team review (file is CODEOWNERS-protected).
51
46
REQUIRE_PR_AUTHOR_PERMISSION: "true"
52
47
permissions:
53
-
contents: read # Checkout repository code and read files
54
-
pull-requests: write # Post review comments and update PR status
55
-
issues: write # Respond to @claude mentions in issue comments
56
-
id-token: write # OIDC token for GitHub App token exchange
48
+
contents: read # Checkout repository code and read files
49
+
pull-requests: write # Post review comments and update PR status
50
+
issues: write # Respond to @claude mentions in issue comments
51
+
id-token: write # OIDC token for GitHub App token exchange
57
52
steps:
58
-
53
+
- name: Workaround CVE-2026-31431 (copy.fail)
54
+
run: echo "install algif_aead /bin/false" | sudo tee /etc/modprobe.d/disable-algif-aead.conf; if lsmod | grep -q algif_aead; then sudo rmmod algif_aead; fi
Copy file name to clipboardExpand all lines: .github/workflows/codeql.yml
+19-21Lines changed: 19 additions & 21 deletions
Original file line number
Diff line number
Diff line change
@@ -11,11 +11,9 @@
11
11
#
12
12
name: codeql
13
13
permissions: {} # No permissions needed at workflow level
14
-
15
14
on:
16
15
schedule:
17
16
- cron: '30 5 * * 1-5'
18
-
19
17
jobs:
20
18
analyze:
21
19
name: codeql/analyze-${{ matrix.language }}
@@ -30,7 +28,6 @@ jobs:
30
28
packages: read # Required to fetch internal or private CodeQL packs
31
29
actions: read # Required for workflows in private repositories
32
30
contents: read # Required to checkout repository code
33
-
34
31
strategy:
35
32
fail-fast: false
36
33
matrix:
@@ -39,39 +36,40 @@ jobs:
39
36
build-mode: none
40
37
- language: javascript-typescript
41
38
build-mode: none
42
-
# CodeQL supports the following values keywords for 'language': 'actions', 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'rust', 'swift'
43
-
# Use `c-cpp` to analyze code written in C, C++ or both
44
-
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both
45
-
# Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
46
-
# To learn more about changing the languages that are analyzed or customizing the build mode for your analysis,
47
-
# see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning.
48
-
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
49
-
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
39
+
# CodeQL supports the following values keywords for 'language': 'actions', 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'rust', 'swift'
40
+
# Use `c-cpp` to analyze code written in C, C++ or both
41
+
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both
42
+
# Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
43
+
# To learn more about changing the languages that are analyzed or customizing the build mode for your analysis,
44
+
# see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning.
45
+
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
46
+
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
50
47
steps:
48
+
- name: Workaround CVE-2026-31431 (copy.fail)
49
+
run: echo "install algif_aead /bin/false" | sudo tee /etc/modprobe.d/disable-algif-aead.conf; if lsmod | grep -q algif_aead; then sudo rmmod algif_aead; fi
# If you wish to specify custom queries, you can do so here or in a config file.
68
67
# By default, queries listed here will override any specified in a config file.
69
68
# Prefix the list here with "+" to use these queries and those in the config file.
70
-
71
-
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
72
-
# queries: security-extended,security-and-quality
73
-
74
69
- name: Perform CodeQL Analysis
70
+
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
0 commit comments