feat(security): add codeql.yml for SAST scanning#100
Conversation
|
Warning Rate limit exceeded
Your organization is not enrolled in usage-based pricing. Contact your admin to enable usage-based pricing to continue reviews beyond the rate limit, or try again in 10 minutes and 58 seconds. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Organization UI Review profile: ASSERTIVE Plan: Pro Run ID: 📒 Files selected for processing (1)
✨ Finishing Touches🧪 Generate unit tests (beta)
Comment |
There was a problem hiding this comment.
Pull request overview
Adds a GitHub CodeQL Analysis workflow to bring the repository into compliance with the org CI standard and enable SAST scanning for the GitHub Actions ecosystem.
Changes:
- Introduces
.github/workflows/codeql.ymlto run CodeQL on pushes/PRs tomainand on a weekly schedule. - Configures CodeQL to scan the
actionslanguage with least-privilege permissions and SHA-pinned actions.
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
Self-review complete — one action item for @don-petryThe workflow is correct and all checks pass except This is a repository settings conflict: GitHub's Default Setup for CodeQL is still enabled. When an advanced configuration ( To fix (one-time settings change):
This is the same fix noted in the PR #84 comment history. The workflow file itself is correct; it just cannot coexist with Default Setup. After disabling Default Setup and re-running the check, this PR is ready to merge. @don-petry please review and merge when CI is green. |
Adds the required CodeQL Analysis workflow for the .github repository. Scans the `actions` ecosystem (per standard: repos with .github/workflows/*.yml must scan `actions`). Uses codeql-action@v4.35.1 pinned to SHA per the Action Pinning Policy. Closes #39 Co-authored-by: don-petry <don-petry@users.noreply.github.com>
32dd787 to
2c2701a
Compare
|
… setup The org standard previously required every repo to carry a codeql.yml workflow file. In practice the fleet used a minimal advanced configuration that added maintenance overhead (SHA pinning, Dependabot bumps, manual language matrix) without providing anything GitHub's managed default setup doesn't already cover. This commit: - Rewrites ci-standards.md §2 to make default setup the standard - Deletes .github/workflows/codeql.yml from this repo (added in #100) - Updates compliance-audit.sh: replaces codeql.yml file existence check with code-scanning/default-setup API probe, and flags stray codeql.yml files as drift - Updates apply-rulesets.sh: derives the `CodeQL` required-status-check context from the default-setup API instead of workflow file parsing - Updates apply-repo-settings.sh: adds apply_codeql_default_setup() so `--all` runs enable default setup fleet-wide Repos with a concrete need for advanced setup (custom query packs, path filters, compiled-language build modes) may opt out by filing a standards PR documenting the exception. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
… setup The org standard previously required every repo to carry a codeql.yml workflow file. In practice the fleet used a minimal advanced configuration that added maintenance overhead (SHA pinning, Dependabot bumps, manual language matrix) without providing anything GitHub's managed default setup doesn't already cover. This commit: - Rewrites ci-standards.md §2 to make default setup the standard - Deletes .github/workflows/codeql.yml from this repo (added in #100) - Updates compliance-audit.sh: replaces codeql.yml file existence check with code-scanning/default-setup API probe, and flags stray codeql.yml files as drift - Updates apply-rulesets.sh: derives the `CodeQL` required-status-check context from the default-setup API instead of workflow file parsing - Updates apply-repo-settings.sh: adds apply_codeql_default_setup() so `--all` runs enable default setup fleet-wide Repos with a concrete need for advanced setup (custom query packs, path filters, compiled-language build modes) may opt out by filing a standards PR documenting the exception. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
* feat(security): replace per-repo CodeQL workflows with GitHub default setup The org standard previously required every repo to carry a codeql.yml workflow file. In practice the fleet used a minimal advanced configuration that added maintenance overhead (SHA pinning, Dependabot bumps, manual language matrix) without providing anything GitHub's managed default setup doesn't already cover. This commit: - Rewrites ci-standards.md §2 to make default setup the standard - Deletes .github/workflows/codeql.yml from this repo (added in #100) - Updates compliance-audit.sh: replaces codeql.yml file existence check with code-scanning/default-setup API probe, and flags stray codeql.yml files as drift - Updates apply-rulesets.sh: derives the `CodeQL` required-status-check context from the default-setup API instead of workflow file parsing - Updates apply-repo-settings.sh: adds apply_codeql_default_setup() so `--all` runs enable default setup fleet-wide Repos with a concrete need for advanced setup (custom query packs, path filters, compiled-language build modes) may opt out by filing a standards PR documenting the exception. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * fix: address review comments from Copilot and CodeRabbit on #103 - Replace placeholder #<this-pr> with #103 in compliance-audit.sh - Fix apply-repo-settings.sh: docstring now matches behavior (warn and continue on failure, not hard fail); add CODEQL_ADVANCED_EXCEPTIONS list so approved advanced-setup repos are skipped - Fix apply-rulesets.sh: distinguish API probe errors from explicit "not-configured" state — probe failures now exit nonzero instead of silently omitting CodeQL from required checks - Fix ci-standards.md: remove misleading "coverage" wording from Python section; fix MD028 blank line inside blockquote (Lint failure) - Update github-settings.md: CodeQL check name is now `CodeQL` (default setup context), not `Analyze` / `Analyze (<language>)` Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * chore: trigger CodeQL default setup scan on PR --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>



Summary
codeql.ymlCodeQL Analysis workflow to resolve compliance finding Compliance: missing-codeql.yml #39actionsecosystem (required for repos with.github/workflows/*.ymlper the CI standard)main+ weekly Friday scan (12:00 PM EST)codeql-actionpinned tov4.35.1SHA per the Action Pinning PolicyNotes
Analyze (actions)matches theAnalyze (<lang>)pattern required for branch protection checkspermissions: {}top-level with least-privilege per-job scopes (actions: read,security-events: write,contents: read)Closes #39
Generated with Claude Code