Skip to content

Commit d633327

Browse files
Add CodeQL resources to README.
1 parent c3520ee commit d633327

1 file changed

Lines changed: 40 additions & 5 deletions

File tree

README.md

Lines changed: 40 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,44 @@
11
# GitHub Security Lab
22

3-
## CodeQL Queries
4-
[Security related queries](CodeQL_Queries)
3+
This is the main git repository of [GitHub Security Lab](https://securitylab.github.com/).
4+
We use it for these main purposes:
55

6-
## Proof of Concepts
7-
[Proof-of-concept exploits (PoCs) for bugs found by the Lab](SecurityExploits/)
6+
* We use [issues on this repo](https://github.com/github/securitylab/issues?q=is%3Aissue+is%3Aopen+label%3A%22All+For+One%22) to track CodeQL [bounty requests](https://securitylab.github.com/bounties).
7+
* We use it for publishing some of our proof-of-concept exploits (after the vulnerability has been fixed). These PoCs can be found in the [SecurityExploits](SecurityExploits) sub-directory.
8+
* Examples of CodeQL queries, which can be found in the [CodeQL_Queries](CodeQL_Queries) sub-directory.
89

9-
Resources related to [GitHub Security Lab](https://securitylab.github.com).
10+
## CodeQL Resources
11+
12+
### Official resources
13+
14+
* [CodeQL documentation](https://codeql.github.com/docs/)
15+
* [CodeQL GitHub repo](https://github.com/github/codeql)
16+
17+
### Example queries
18+
19+
* Java
20+
* [Apache Struts CVE-2018-11776](CodeQL_Queries/java/Apache_Struts_CVE-2018-11776)
21+
* C/C++
22+
* [Apple XNU icmp_error CVE-2018-4407](CodeQL_Queries/cpp/XNU_icmp_error_CVE-2018-4407)
23+
* [Facebook Fizz integer overflow vulnerability (CVE-2019-3560)](CodeQL_Queries/cpp/Facebook_Fizz_CVE-2019-3560)
24+
* [Eating error codes in libssh2](CodeQL_Queries/cpp/libssh2_eating_error_codes)
25+
* Javascript
26+
* [Etherpad CVE-2018-6835](CodeQL_Queries/javascript/Etherpad_CVE-2018-6835)
27+
* C#
28+
* [C# Zip Slip demo](CodeQL_Queries/csharp/ZipSlip)
29+
* GitHub Actions:
30+
* [pull_request_target with explicit pull request checkout](CodeQL_Queries/actions/pull_request_target.ql)
31+
* [Command injection from user-controlled Actions context](CodeQL_Queries/actions/script_injections.ql)
32+
33+
### Videos
34+
35+
* Conference talks/workshops:
36+
* [Finding security vulnerabilities in JavaScript with CodeQL - GitHub Satellite 2020](https://www.youtube.com/watch?v=pYzfGaLTqC0)
37+
* [Finding security vulnerabilities in Java with CodeQL - GitHub Satellite 2020](https://www.youtube.com/watch?v=nvCd0Ee4FgE)
38+
* [CodeQL as an auditing oracle - POC 2020](https://www.youtube.com/watch?v=XmAEgl8bVhg)
39+
* [mbuf-oflow: Finding Vulnerabilities In iOS/MacOS Networking Code](https://www.youtube.com/watch?v=0EHP2gzwVAY)
40+
* CodeQL demos from the Semmle days (short Youtube videos):
41+
* [PII data leaks: Identifying personal information in logs with CodeQL](https://www.youtube.com/watch?v=hHaOxbyqy44)
42+
* [Vulnerability Hunting: Quest for an Exploit using QL](https://www.youtube.com/watch?v=irrYp3wdtsw)
43+
* [Finding Insecure Deserialization in Java](https://www.youtube.com/watch?v=XsUcSd75K00)
44+
* [Finding integer overflows in Libssh2](https://www.youtube.com/watch?v=czXicfULOfk)

0 commit comments

Comments
 (0)