CodeQL query help for SwiftΒΆ
Visit the articles below to see the documentation for the queries included in the following query suites:
default
: queries run by default in CodeQL code scanning on GitHub.security-extended
: queries fromdefault
, plus extra security queries with slightly lower precision and severity.security-and-quality
: queries fromdefault
,security-extended
, plus extra maintainability and reliability queries.
These queries are published in the CodeQL query pack codeql/swift-queries
(changelog, source).
For shorter queries that you can use as building blocks when writing your own queries, see the example queries in the CodeQL repository.
- Bad HTML filtering regexp
- Cleartext logging of sensitive information
- Cleartext storage of sensitive information in a local database
- Cleartext storage of sensitive information in an application preference store
- Cleartext transmission of sensitive information
- Constant password
- Database query built from user-controlled sources
- Encryption using ECB
- Hard-coded encryption key
- Incomplete regular expression for hostnames
- Inefficient regular expression
- Insecure TLS configuration
- Insufficient hash iterations
- JavaScript Injection
- Missing regular expression anchor
- Predicate built from user-controlled sources
- Regular expression injection
- Resolving XML external entity in user-controlled data
- Static initialization vector for encryption
- String length conflation
- System command built from user-controlled sources
- Uncontrolled data used in path expression
- Uncontrolled format string
- Unsafe WebView fetch
- Use of a broken or weak cryptographic hashing algorithm on sensitive data
- Use of an inappropriate cryptographic hashing algorithm on passwords
- Use of constant salts