{"meta":{"title":"关于使用 CodeQL 进行代码扫描","intro":"可以使用 CodeQL 来识别代码中的漏洞和错误。 结果在 GitHub 中显示为 code scanning 警报。","product":"安全性和代码质量","breadcrumbs":[{"href":"/zh/code-security","title":"安全性和代码质量"},{"href":"/zh/code-security/concepts","title":"Concepts"},{"href":"/zh/code-security/concepts/code-scanning","title":"代码扫描"},{"href":"/zh/code-security/concepts/code-scanning/codeql","title":"CodeQL"},{"href":"/zh/code-security/concepts/code-scanning/codeql/about-code-scanning-with-codeql","title":"CodeQL 代码扫描"}],"documentType":"article"},"body":"# 关于使用 CodeQL 进行代码扫描\n\n可以使用 CodeQL 来识别代码中的漏洞和错误。 结果在 GitHub 中显示为 code scanning 警报。\n\n<!-- TRANSLATION_FALLBACK prop=markdown type=ParseError line=19 col=1 msg=\"tag 'endif' not found\" -->\nCodeQL is the code analysis engine developed by GitHub to automate security checks. You can analyze your code using CodeQL and display the results as code scanning alerts.\n\nThere are three main ways to use CodeQL analysis for code scanning:\n\n* Use default setup to quickly configure CodeQL analysis for code scanning on your repository. Default setup automatically chooses the languages to analyze, query suite to run, and events that trigger scans. If you prefer, you can manually select the query suite to run and languages to analyze. After you enable CodeQL, GitHub Actions will execute workflow runs to scan your code. For more information, see [Configuring default setup for code scanning](/en/code-security/code-scanning/enabling-code-scanning/configuring-default-setup-for-code-scanning).\n\n* Use advanced setup to add the CodeQL workflow to your repository. This generates a customizable workflow file which uses the [github/codeql-action](https://github.com/github/codeql-action/) to run the CodeQL CLI. For more information, see [Configuring advanced setup for code scanning](/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/configuring-advanced-setup-for-code-scanning#configuring-advanced-setup-for-code-scanning-with-codeql).\n\n* Run the CodeQL CLI directly in an external CI system and upload the results to GitHub. For more information, see [Using code scanning with your existing CI system](/en/code-security/code-scanning/integrating-with-code-scanning/using-code-scanning-with-your-existing-ci-system).\n\nFor information about code scanning alerts, see [About code scanning alerts](/en/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts).\n\n## About CodeQL\n\nCodeQL is a programming language and associated tools that treat code like data. It was created explicitly to make it easier to analyze code and find potential vulnerabilities in your code with greater confidence than traditional static analyzers.\n\n1. You generate a CodeQL database to represent your codebase.\n2. Then you run CodeQL queries on that database to identify problems in the codebase.\n3. The query results are shown as code scanning alerts in GitHub when you use CodeQL with code scanning.\n\nCodeQL supports both compiled and interpreted languages, and can find vulnerabilities and errors in code that's written in the supported languages.\n\nCodeQL supports the following languages:\n\n<!-- If you update the list of supported languages for CodeQL, update docs-internal/content/get-started/learning-about-github/github-language-support.md to reflect the changes. -->\n\n* C/C++\n* C#\n* Go\n* Java/Kotlin\n* JavaScript/TypeScript\n* Python\n* Ruby\n* Rust\n* Swift\n* GitHub Actions workflows\n\n> \\[!NOTE]\n>\n> * Use `java-kotlin` to analyze code written in Java, Kotlin or both.\n> * Use `javascript-typescript` to analyze code written in JavaScript, TypeScript or both.\n\nFor more information, see the documentation on the CodeQL website: [Supported languages and frameworks](https://codeql.github.com/docs/codeql-overview/supported-languages-and-frameworks/).\n\n> \\[!IMPORTANT]\n> CodeQL does **not** support languages that are not listed above. This includes, but is not limited to, **PHP**, **Scala**, and others. Attempting to use CodeQL with unsupported languages may result in no alerts being generated and incomplete analysis.\n\n## Modeling custom or niche frameworks\n\nGitHub experts, security researchers, and community contributors write libraries to model the flow of data in popular frameworks and libraries. If you use custom dependencies that aren't modeled, then you can use the CodeQL extension for Visual Studio Code to create models for these dependencies and use them to extend your analysis. For more information, see [Using the CodeQL model editor](/en/code-security/codeql-for-vs-code/using-the-advanced-functionality-of-the-codeql-for-vs-code-extension/using-the-codeql-model-editor).\n\n## CodeQL queries\n\nGitHub experts, security researchers, and community contributors write and maintain the default CodeQL queries used for code scanning. The queries are regularly updated to improve analysis and reduce any false positive results.\n\n### Writing your own queries\n\nThe queries are open source, so you can view and contribute to the queries in the [github/codeql](https://github.com/github/codeql) repository. For more information, see [About CodeQL queries](https://codeql.github.com/docs/writing-codeql-queries/about-codeql-queries/) in the CodeQL documentation.\n\n### Running additional queries\n\nIf you are scanning your code with advanced setup or an external CI system, you can run additional queries as part of your analysis.\n\nThese queries must belong to a published CodeQL query pack or a CodeQL pack in a repository.\n\n* When a CodeQL query pack is published to the GitHub Container registry, all the transitive dependencies required by the queries and a compilation cache are included in the package. This improves performance and ensures that running the queries in the pack gives identical results every time until you upgrade to a new version of the pack or the CLI.\n\n* CodeQL query packs can be downloaded from multiple GitHub container registries. For more information, see [Workflow configuration options for code scanning](/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#downloading-codeql-packs-from-github-enterprise-server).\n\nFor more information, see [Customizing analysis with CodeQL packs](/en/code-security/codeql-cli/getting-started-with-the-codeql-cli/customizing-analysis-with-codeql-packs)."}