Skip to content

Add CodeQL workflow for TypeScript/Svelte #210

@stultus

Description

@stultus

Context

CodeQL is GitHub's static-analysis security scanner. Free for public repos. It catches common vulnerability patterns (XSS sinks, injection, prototype pollution, unsafe `eval`) that ESLint and `svelte-check` don't flag.

For a Tauri app this is especially relevant — the JS frontend talks to Rust over IPC, and any unvalidated string flowing from frontend → `invoke()` → Rust handler is a potential exploit path.

Action

Add `.github/workflows/codeql.yml`:

  • Languages: `javascript-typescript` (covers .ts, .svelte). Optionally also `rust` if it works for the project's structure.
  • Schedule: weekly + on push to main + on PRs to main.
  • Queries: default `security-and-quality` pack.

Use the GitHub-suggested template: https://github.com/stultus/scriptty/security/code-scanning

Findings appear in the Security tab and as PR annotations.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions