GitHub releases the Security Vulnerabilities Code Scanning Tool for All Users
GitHub is releasing a new code scanning tool to help developers identify vulnerabilities before the software is created.
The tool was initially revealed at the GitHub Satellite Conference in May, as it is only accessible to GitHub beta testers.
Now, for all users, the GitHub code scanning tool is available and will allow it to form a public repository. The latest tool is the product of last year’s Semmle acquisition.
Semmle is a forum for code analysis that lets developers write queries that recognise code patterns and check for vulnerabilities and their variants in large codebases.
GitHub said they “worked to introduce the CodeQL technology ‘s groundbreaking code analysis capabilities to GitHub users as a native capability.”
Code scanning tool for GitHub users, powered by powerful CodeQL code analysis engine technology as a native capability. To optimise versatility for your team, the tool is integrated with GitHub Behavior or your current CI / CD setting.
The tool scans over “12,000 repositories 1.4 million times since the launch of the beta version, and identified more than 20,000 security problems like remote code execution (RCE), SQL injection, and cross-site scripting (XSS) vulnerabilities.”
The tool helped developers to fix 72% of security errors before moving the application with the production environment.
Code scanning is free for public repositories here you can find how to enable code scanning today. For private repositories, it is available through Advanced Security.