CodeQL query help for RubyΒΆ
Visit the articles below to see the documentation for the queries included in the following query suites:
default
: queries run by default in CodeQL code scanning on GitHub.security-extended
: queries fromdefault
, plus extra security queries with slightly lower precision and severity.security-and-quality
: queries fromdefault
,security-extended
, plus extra maintainability and reliability queries.
These queries are published in the CodeQL query pack codeql/ruby-queries
(changelog, source).
For shorter queries that you can use as building blocks when writing your own queries, see the example queries in the CodeQL repository.
- Bad HTML filtering regexp
- Badly anchored regular expression
- CSRF protection not enabled
- CSRF protection weakened or disabled
- Clear-text logging of sensitive information
- Clear-text storage of sensitive information
- Code injection
- Dependency download using unencrypted communication channel
- Deserialization of user-controlled data
- Download of sensitive file through insecure connection
- Hard-coded credentials
- Hard-coded data interpreted as code
- Incomplete URL substring sanitization
- Incomplete multi-character sanitization
- Incomplete regular expression for hostnames
- Incomplete string escaping or encoding
- Inefficient regular expression
- Information exposure through an exception
- Insecure Mass Assignment
- Log injection
- Missing regular expression anchor
- Network data written to file
- Overly permissive regular expression range
- Polynomial regular expression used on uncontrolled data
- Reflected server-side cross-site scripting
- Regular expression injection
- Request without certificate validation
- SQL query built from user-controlled sources
- Sensitive data read from GET request
- Server-side request forgery
- Stored cross-site scripting
- URL redirection from remote source
- Uncontrolled command line
- Uncontrolled data used in path expression
- Unsafe HTML constructed from library input
- Unsafe code constructed from library input
- Unsafe shell command constructed from library input
- Use of
Kernel.open
orIO.read
or similar sinks with a non-constant value - Use of
Kernel.open
,IO.read
or similar sinks with user-controlled input - Use of a broken or weak cryptographic algorithm
- Use of a broken or weak cryptographic hashing algorithm on sensitive data
- Use of externally-controlled format string
- Weak cookie configuration
- XML external entity expansion