CodeQL query for Javascript project #20552
Sridharc20
started this conversation in
General
Replies: 2 comments 1 reply
-
|
Hi @Sridharc20, Thanks for your question.
This can be checked using the
This can be checked using the
For these you would likely want to have a look a dataflow. |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
I would like to automate this process, but I’ve found that generalizing a CodeQL query (source-to-sink) for any vulnerability is not feasible. For each vulnerability, I need to modify the CodeQL query accordingly. Any guidance on this would be greatly appreciated. Essentially, my goal is to automate the following steps using CodeQL:
|
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi everyone,
I’m working on developing CodeQL queries for JavaScript and would like your input. My goals are:
1. Check if a given OSS package is present in package.json.
2. Verify if the OSS package is actually imported in the code.
3. Generate a call graph.
4. Determine whether a sink function is reachable and executed.
5. Assess if the sink function is exploitable.
So far, I’ve been able to generate the call graph. I’d appreciate any guidance on whether the other checks are feasible with CodeQL, and suggestions on how to approach them.
Beta Was this translation helpful? Give feedback.
All reactions