Skip to content

Commit 298ae19

Browse files
authored
Add codeql config to mass suppress certain not-applicable rules (#14240)
**Experimental config.** This should automatically resolve 40 alerts from our reporting portal once the backend changes come online. ###### Microsoft Reviewers: [Open in CodeFlow](https://microsoft.github.io/open-pr/?codeflow=https://github.com/dotnet/winforms/pull/14240)
2 parents b8397d6 + 0709110 commit 298ae19

1 file changed

Lines changed: 19 additions & 0 deletions

File tree

.CodeQL.yml

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
# This file configures CodeQL runs and TSA bug autofiling. For more information, see:
2+
# https://eng.ms/docs/coreai/devdiv/one-engineering-system-1es/1es-docs/codeql/troubleshooting/bugs/generated-library-code
3+
# (Access restricted to Microsoft employees only.)
4+
5+
queries:
6+
#
7+
# REPO-WIDE RULE EXCLUSIONS
8+
#
9+
- exclude:
10+
queryId:
11+
# [Serializable] doesn't imply that a type is *safe* to [de]serialize; only that it is
12+
# *possible* to do so. The rules below incorrectly assume we're trying to make a safety
13+
# guarantee.
14+
- "cs/dangerous-deserialization-routine"
15+
- "cs/deserialization-of-pointer-type"
16+
# We already have CodeQL + Roslyn rules running to detect usage of dangerous deserialization
17+
# APIs. Those call sites are well-reviewed and don't benefit from extra alerts regarding
18+
# the possibility of loading malicious code.
19+
- "cs/deserialization-unexpected-subtypes"

0 commit comments

Comments
 (0)