jorgectf commented on PR #1721:
URL: https://github.com/apache/solr/pull/1721#issuecomment-1614818391

   @madrob
   > 1. We need to be able to exclude certain paths. For example, I don't think 
we're interested in the javascript scan results for `solr/webapp/web/libs/*` as 
that is all third party code that we don't intend to change.
   
   You can use `paths-ignore` in a CodeQL configuration file. See 
https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/customizing-code-scanning#specifying-directories-to-scan.
 
https://github.com/apache/solr/pull/1721/commits/f9c7be6a8f17144a595e0e1bf7681d5cbf398e53
 should do the trick :)
   
   > 2. Is there a way to mark certain methods as returning sanitized inputs? 
There are some very long taint analysis chains provided by CodeQL which is 
awesome, but some of them seem to miss that a value becomes safe at some point.
   
   That is what we call "Sanitizers". You are welcome to contribute to 
https://github.com/github/codeql or open a [False Positive 
Issue](https://github.com/github/codeql/issues/new?assignees=&labels=false-positive&projects=&template=ql--false-positive.md&title=False+positive)
 so we can take a look and improve the query!
   
   > 3. Is there a way to run this or similar analysis locally for developers? 
We have tried very hard in the past to avoid "surprises" in PRs where the 
developer runs into a failing check but has no way to verify that they've 
actually solved it other than to keep resubmitting their PR. It tends to lead 
to some bad experiences for contributors which we tend to care quite a bit 
about.
   
   That would be technically possible, but not comfortable for the PR author 
IMO. The [pull request 
alerts](https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/triaging-code-scanning-alerts-in-pull-requests#viewing-an-alert-on-your-pull-request)
 should be easily actionable so the author knows what to do, and when they 
succeeded fixing the alert.
   
   > 4. Who will the report be visible to? Project members? Everybody?
   
   The alerts will be visible in the `Security` tab of the repository for those 
with at least `write` access to the repository and [security 
managers](https://docs.github.com/en/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@solr.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@solr.apache.org
For additional commands, e-mail: issues-h...@solr.apache.org

Reply via email to