Skip to main content

Managing your code scanning configuration

You can manage your existing code scanning configuration with the help of metrics and logging outputs generated by your analysis.

Who can use this feature?

Code scanning is available for all public repositories on GitHub.com. To use code scanning in a private repository owned by an organization, you must have a license for GitHub Advanced Security. For more information, see "About GitHub Advanced Security."

About the tool status page for code scanning

The tool status page shows useful information about all of your code scanning tools. If code scanning is not working as you'd expect, the tool status page is a good starting point for debugging problems.

Editing your configuration of default setup

You can edit your existing configuration of default setup for code scanning to better meet your code security needs.

CodeQL query suites

You can choose from different built-in CodeQL query suites to use in your CodeQL code scanning setup.

Configuring larger runners for default setup

You can run code scanning default setup more quickly on bigger codebases using larger runners.

Viewing code scanning logs

You can view the output generated during code scanning analysis in GitHub.com.

C and C++ queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in C or C++ when you select the default or the security-extended query suite.

C# queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in C# when you select the default or the security-extended query suite.

Go queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in Go (Golang) when you select the default or the security-extended query suite.

Java and Kotlin queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in Java or Kotlin when you select the default or the security-extended query suite.

JavaScript and TypeScript queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in JavaScript or TypeScript when you select the default or the security-extended query suite.

Python queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in Python when you select the default or the security-extended query suite.

Ruby queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in Ruby when you select the default or the security-extended query suite.

Swift queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in Swift when you select the default or the security-extended query suite.