CodeQL includes many queries for analyzing Rust code. All queries in the default
query suite are run by default. If you choose to use the security-extended
query suite, additional queries are run. For more information, see CodeQL query suites.
Built-in queries for Rust analysis
This table lists the queries available with the latest release of the CodeQL action and CodeQL CLI. For more information, see CodeQL change logs in the CodeQL documentation site.
Note
The initial release of GitHub Enterprise Server 3.17 included CodeQL action and CodeQL CLI 2.20.7, which may not include all of these queries. Your site administrator can update your CodeQL version to a newer release. For more information, see Configuring code scanning for your appliance.
Query name | Related CWEs | Default | Extended | Copilot Autofix |
---|---|---|---|---|
Access of invalid pointer | 476, 825 | |||
Cleartext logging of sensitive information | 312, 359, 532 | |||
Cleartext transmission of sensitive information | 319 | |||
Database query built from user-controlled sources | 089 | |||
Hard-coded cryptographic value | 259, 321, 798, 1204 | |||
Regular expression injection | 020, 074 | |||
Uncontrolled allocation size | 770, 789 | |||
Uncontrolled data used in path expression | 022, 023, 036, 073, 099 | |||
Use of a broken or weak cryptographic algorithm | 327 | |||
Use of a broken or weak cryptographic hashing algorithm on sensitive data | 327, 328, 916 | |||
Access of a pointer after its lifetime has ended | 825 |