CodeQL 2.23.5 Adds New Language Support and Security Query Improvements
Allison discusses the features and improvements in CodeQL 2.23.5, focusing on enhanced language support and more accurate security analysis for GitHub code scanning.
CodeQL 2.23.5 Adds New Language Support and Security Query Improvements
CodeQL—GitHub’s static analysis engine—continues to advance security scanning capabilities with the release of version 2.23.5. This upgrade delivers expanded language support and accuracy enhancements designed to help developers and security teams identify and remediate vulnerabilities more effectively.
Key Enhancements in CodeQL 2.23.5
Language and Framework Updates
- Swift: Full support for Swift 6.2 is now available, allowing analysis of projects built with this version.
- Rust: Integration for the
actix-webframework, plus expanded coverage ofmysqlandmysql_asynclibraries. - C#: Basic tracing and extraction on macOS/Linux when using the .NET CLI (
dotnet), including support for .NET 10 RC2 with directcscinvocations.
Security Query Improvements
C#
- Extensive rewrite of the
cs/dereferenced-value-may-be-nullquery to drastically lower false positives and shift frompath-problemtoproblemformat. - Broadened criteria in the
cs/constant-conditionquery, yielding more high-confidence results. - Improved detection for
cs/web/missing-x-frame-options, recognizing nested configuration scenarios.
Java/Kotlin
- The
java/sensitive-cookie-not-httponlyquery is now a primary query, moving out of experimental status. - Three notable queries added for concurrency issues:
java/escaping,java/not-threadsafe, andjava/safe-publication, all focusing on analyzing classes marked@ThreadSafe. - Calls to
String.matchesnow serve as sanitizers within thejava/ssrfquery to further reduce false positives.
Python
- The
py/insecure-cookiequery was split into specialized queries:py/insecure-cookie(Secure flag),py/client-exposed-cookie(HttpOnly flag), andpy/samesite-none(SameSite attribute), now triggering alerts only when sensitive data is detected.
Availability
CodeQL 2.23.5 is auto-deployed for GitHub code scanning users on github.com. The functionality is also included in GitHub Enterprise Server (GHES) 3.20. Users of earlier GHES versions can manually upgrade their CodeQL instance if required.
Summary
With its ongoing improvements in static code analysis, CodeQL helps teams proactively identify and address vulnerabilities. This release’s expanded coverage across several popular languages and frameworks allows both open source and enterprise development teams to benefit from more accurate security insights and reduced false positives.
This post appeared first on “The GitHub Blog”. Read the entire article here