You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. Navigate to about **line 16** and modify it to the below.
16
+
17
+
```py
18
+
"SELECT * FROM books WHERE name LIKE '%"+ name +"%'"
19
+
```
20
+
21
+
1. Above the editor in the top-right, click the **Commit changes...** button. Select the radio button next to **Create a new branch**. **DO NOT commit it to main branch.**
22
+
23
+
1. Click **Propose changes** option and click **Create pull request**.
24
+
25
+
### ⌨️ Activity: Review pull request
26
+
27
+
1. If needed, navigate to the newly created pull requests from the previous activity.
28
+
29
+
1. Scroll to the bottom of the pull request. Search for a check named `CodeQL`. This is the analysis job scanning the proposed code changes in the pull request.
1. With the pull request started, Mona will check your progress and share the next steps.
43
+
44
+
45
+
<!-- If you would like to learn more about pull request integrations for code scanning, see "[Triage code scanning alerts in pull requests](https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/triaging-code-scanning-alerts-in-pull-requests)." -->
Copy file name to clipboardExpand all lines: .github/steps/2-step.md
+32-29Lines changed: 32 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,25 @@
1
1
## Step 2: Review and Triage CodeQL Alerts
2
2
3
-
Now we will review the CodeQL scan results, triage an alert, and create a GitHub issue to track an alert.
3
+
With our pull request changes now reviewed by CodeQL, let's take a moment to learn about managing alerts.
4
4
5
-
### What is CWE
5
+
GitHub provides a dedicated **Security** tab for securely managing all security related issues. CodeQL saves alerts using the same standard as many other analysis tools with the results showing up under the **Code scanning** area.
6
6
7
-
Common Weakness Enumeration (CWE) is a category system for hardware and software weaknesses and vulnerabilities. Think of it as a way to describe and categorize security issues in an application's source code. For more information on CWEs, see the Wikipedia article [Common Weakness Enumeration](https://en.wikipedia.org/wiki/Common_Weakness_Enumeration).
The main area of an alert provides the resolution status, affected branch, code location, and classification information like severity and [CVE identification number](https://docs.github.com/en/code-security/security-advisories/working-with-repository-security-advisories/about-repository-security-advisories#cve-identification-numbers).
<!-- > 💡 Tip: Clicking the **Show paths** link will provide additional insights about the alert's data flow from user input (source), through the application, and when it is acted on (sink). -->
17
+
18
+
### What is 'CWE'
19
+
20
+
Many of the patterns CodeQL scans for come from existing databases of vulnerabilities.
21
+
22
+
The Common Weakness Enumeration (CWE) is a category system for hardware and software weaknesses and vulnerabilities. Think of it as a way to describe and categorize security issues in an application's source code. For more information on CWEs, see the Wikipedia article [Common Weakness Enumeration](https://en.wikipedia.org/wiki/Common_Weakness_Enumeration).
8
23
9
24
### ⌨️ Activity: View the status of a CodeQL scan
10
25
@@ -26,43 +41,31 @@ Common Weakness Enumeration (CWE) is a category system for hardware and software
26
41
27
42
1. (Optional) Use the filters and search bar to explore the open and closed security alerts, including from the CodeQL scan.
28
43
29
-
#### Alert status and location
30
-
31
-
The main area of the alert provides the resolution status, affected branch, code location, and classification information like severity and [CVE identification number](https://docs.github.com/en/code-security/security-advisories/working-with-repository-security-advisories/about-repository-security-advisories#cve-identification-numbers).
32
-
33
-
> 💡 Tip: Clicking the **Show paths** link will provide additional insights about the alert's data flow from user input (source), through the application, and when it is acted on (sink).
0 commit comments