This version of GitHub Enterprise was discontinued on 2023-01-18. No patch releases will be made, even for critical security issues. For better performance, improved security, and new features, upgrade to the latest version of GitHub Enterprise. For help with the upgrade, contact GitHub Enterprise support.
Finding security vulnerabilities and errors in your code with code scanning
Keep your code secure by using code scanning to identify and fix potential security vulnerabilities and other errors in your code.
Code scanning is available for organization-owned repositories in GitHub Enterprise Server. This feature requires a license for GitHub Advanced Security. For more information, see "About GitHub Advanced Security."
- Automatically scanning your code for vulnerabilities and errors
- About code scanning
- About code scanning alerts
- Triaging code scanning alerts in pull requests
- Configuring code scanning for a repository
- Managing code scanning alerts for your repository
- Customizing code scanning
- About code scanning with CodeQL
- Recommended hardware resources for running CodeQL
- Configuring the CodeQL workflow for compiled languages
- Troubleshooting the CodeQL workflow
- Running CodeQL code scanning in a container
- Viewing code scanning logs
- Integrating with code scanning
- Using the CodeQL CLI
- About the CodeQL CLI
- Getting started with the CodeQL CLI
- Creating CodeQL databases
- Extractor options
- Analyzing databases with the CodeQL CLI
- Using custom queries with the CodeQL CLI
- Creating CodeQL query suites
- Testing query help files
- Specifying command options in a CodeQL configuration file
- CodeQL CLI reference
- Using CodeQL code scanning with your existing CI system