New GitHub code scanning tech should make it easier to spot security flaws.
GitHub now allows developers to scan their code for the “default setup” repository, hopefully helping them to spot any security issues before they escalate.
With this new feature, Github says developers (opens in new tab) will be able to configure the repository automatically, and with as little effort as possible.
That should change soon, said GitHub’s Walker Chabbott, as the company now seeks to expand the support to additional languages by summer.
To stay up to date with latest top stories, make sure to subscribe to this YouTube channel by clicking the button above this video!
Those looking to test out the new feature should open up their repository’s settings, navigate to “Code security and analysis”, and click the “Set up” drop-down menu.
Query packs that will be used and the Events that will trigger scans in the Future these options will be Customizable once enable cautical is Turned on the feature will automatically Start looking for Flaws in the Repository the conical code analysis Engine bleeping computer reminds was Added to the GitHub platform in September 2019 following the latter's Acquisition after a year in beta testing General availability was announced in September 2020 during the beta stage the Tool scan more than 12 000 repositories 1.4 million times and found more than 20 000 security vulnerabilities some of These were of high severity including Remote code execution rce SQL injection And cross-site scripting xss scanning The code is free of charge for all the Publication added stressing that Enterprise users can also benefit from It via the GitHub Advanced security for GitHub Enterprise [Music]