Skip to content

fix(ci): add CodeQL custom sanitizer config to reduce false positives (#1826)#2203

Open
mrveiss wants to merge 1 commit intoDev_new_guifrom
fix/issue-1826
Open

fix(ci): add CodeQL custom sanitizer config to reduce false positives (#1826)#2203
mrveiss wants to merge 1 commit intoDev_new_guifrom
fix/issue-1826

Conversation

@mrveiss
Copy link
Owner

@mrveiss mrveiss commented Mar 23, 2026

Summary

  • Creates .github/codeql/codeql-config.yml with scan paths and extension references
  • Creates .github/codeql/extensions/autobot-sanitizers.yml declaring all custom sanitizers:
    • 7 path-injection sanitizers (validate_path, _validate_admin_path, etc.)
    • 1 SSRF sanitizer (validate_url)
    • 1 LDAP-injection sanitizer (sanitize_ldap_filter)
    • Command-injection sanitizers for git_mcp.py Pydantic validators
  • Adds .github/workflows/codeql.yml workflow referencing the config
  • Should eliminate ~20 false positive CodeQL alerts
  • Closes Add CodeQL custom sanitizer config to reduce false positive alerts #1826

Test plan

  • CodeQL workflow runs successfully on push
  • False positive count reduced in CodeQL scan results
  • No legitimate alerts suppressed

🤖 Generated with Claude Code

…#1826)

Create .github/codeql/codeql-config.yml and extensions/autobot-sanitizers.yml
declaring custom path-injection, SSRF, LDAP-injection, and command-injection
sanitizers. Add CodeQL workflow referencing the config. This should eliminate
~20 false positive alerts from custom validator functions.
@github-actions
Copy link

✅ SSOT Configuration Compliance: Passing

🎉 No hardcoded values detected that have SSOT config equivalents!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant