|
1 | 1 | # GitHub Security Lab |
2 | 2 |
|
3 | | -## CodeQL Queries |
4 | | -[Security related queries](CodeQL_Queries) |
| 3 | +This is the main git repository of [GitHub Security Lab](https://securitylab.github.com/). |
| 4 | +We use it for these main purposes: |
5 | 5 |
|
6 | | -## Proof of Concepts |
7 | | -[Proof-of-concept exploits (PoCs) for bugs found by the Lab](SecurityExploits/) |
| 6 | +* We use [issues on this repo](https://github.com/github/securitylab/issues?q=is%3Aissue+is%3Aopen+label%3A%22All+For+One%22) to track CodeQL [bounty requests](https://securitylab.github.com/bounties). |
| 7 | +* We use it for publishing some of our proof-of-concept exploits (after the vulnerability has been fixed). These PoCs can be found in the [SecurityExploits](SecurityExploits) sub-directory. |
| 8 | +* Examples of CodeQL queries, which can be found in the [CodeQL_Queries](CodeQL_Queries) sub-directory. |
8 | 9 |
|
9 | | -Resources related to [GitHub Security Lab](https://securitylab.github.com). |
| 10 | +## CodeQL Resources |
| 11 | + |
| 12 | +### Official resources |
| 13 | + |
| 14 | +* [CodeQL documentation](https://codeql.github.com/docs/) |
| 15 | +* [CodeQL GitHub repo](https://github.com/github/codeql) |
| 16 | + |
| 17 | +### Example queries |
| 18 | + |
| 19 | +* Java |
| 20 | + * [Apache Struts CVE-2018-11776](CodeQL_Queries/java/Apache_Struts_CVE-2018-11776) |
| 21 | +* C/C++ |
| 22 | + * [Apple XNU icmp_error CVE-2018-4407](CodeQL_Queries/cpp/XNU_icmp_error_CVE-2018-4407) |
| 23 | + * [Facebook Fizz integer overflow vulnerability (CVE-2019-3560)](CodeQL_Queries/cpp/Facebook_Fizz_CVE-2019-3560) |
| 24 | + * [Eating error codes in libssh2](CodeQL_Queries/cpp/libssh2_eating_error_codes) |
| 25 | +* Javascript |
| 26 | + * [Etherpad CVE-2018-6835](CodeQL_Queries/javascript/Etherpad_CVE-2018-6835) |
| 27 | +* C# |
| 28 | + * [C# Zip Slip demo](CodeQL_Queries/csharp/ZipSlip) |
| 29 | +* GitHub Actions: |
| 30 | + * [pull_request_target with explicit pull request checkout](CodeQL_Queries/actions/pull_request_target.ql) |
| 31 | + * [Command injection from user-controlled Actions context](CodeQL_Queries/actions/script_injections.ql) |
| 32 | + |
| 33 | +### Videos |
| 34 | + |
| 35 | +* Conference talks/workshops: |
| 36 | + * [Finding security vulnerabilities in JavaScript with CodeQL - GitHub Satellite 2020](https://www.youtube.com/watch?v=pYzfGaLTqC0) |
| 37 | + * [Finding security vulnerabilities in Java with CodeQL - GitHub Satellite 2020](https://www.youtube.com/watch?v=nvCd0Ee4FgE) |
| 38 | + * [CodeQL as an auditing oracle - POC 2020](https://www.youtube.com/watch?v=XmAEgl8bVhg) |
| 39 | + * [mbuf-oflow: Finding Vulnerabilities In iOS/MacOS Networking Code](https://www.youtube.com/watch?v=0EHP2gzwVAY) |
| 40 | +* CodeQL demos from the Semmle days (short Youtube videos): |
| 41 | + * [PII data leaks: Identifying personal information in logs with CodeQL](https://www.youtube.com/watch?v=hHaOxbyqy44) |
| 42 | + * [Vulnerability Hunting: Quest for an Exploit using QL](https://www.youtube.com/watch?v=irrYp3wdtsw) |
| 43 | + * [Finding Insecure Deserialization in Java](https://www.youtube.com/watch?v=XsUcSd75K00) |
| 44 | + * [Finding integer overflows in Libssh2](https://www.youtube.com/watch?v=czXicfULOfk) |
0 commit comments