-
Notifications
You must be signed in to change notification settings - Fork 321
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create codeql-analysis.yml #3314
Conversation
Codecov Report
@@ Coverage Diff @@
## master #3314 +/- ##
=======================================
Coverage 66.20% 66.20%
=======================================
Files 220 220
Lines 29250 29250
=======================================
Hits 19365 19365
Misses 9885 9885 |
why does github recommend doing this? |
It recommended by https://github.com/QCoDeS/Qcodes/security/code-scanning its supposed to scan for security vulnerabilities but I am not sure how effective it is for python |
interesting, if it is effective it could be worth the extra build time or maybe this is an action that should be performed weekly? |
c61bab3
to
6c431d2
Compare
6c431d2
to
d84d9bd
Compare
@trevormorgan @astafan8 I rebase this removed the comments and changed it to only run once a week. Lets try to enable it and see it it is useful |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
indeed, let's give it a try weekly
Github recommends codeql for security testing. This just proposes to merge their default workflow