GitHub Launches Code Scanning Tool to Find Security Vulnerabilities – Available for All Users

The tool was revealed initially in May at the GitHub Satellite conference, because that time it is readily available for GitHub beta testers.

GitHub releases a brand-new code scanning tool that assists developers to identify vulnerability before the application reaches production.

GitHub Code Scanning Tool

Considering that the launch of the beta variation, the tool scans over “12,000 repositories 1.4 million times, and found more than 20,000 security concerns consisting of remote code execution (RCE), SQL injection, and cross-site scripting (XSS) vulnerabilities.”

Code scanning tool powered by effective code analysis engine CodeQL technology to GitHub users as a native capability. The tool gets incorporated with GitHub Actions– or your existing CI/CD environment– to make the most of versatility for your group.

Code scanning is complimentary for public repositories here you can discover how to enable code scanning today. For private repositories, it is readily available through Advanced Security.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Semmle is a code analysis platform that assists designers to compose inquiries that determine code patterns in large codebases and search for vulnerabilities and their variants.

GitHub stated they “worked to bring the innovative code analysis capabilities of its CodeQL innovation to GitHub users as a native capability.”

Now the GitHub code scanning tool is available for all users and they can enable it to form a public repository. The brand-new tool is the result of the acquisition of Semmle in 2015.

The tool helped designers to repair 72% of security errors prior to moving the application with the production environment.