<?xml version="1.0" encoding="utf-8" ?><rss version="2.0"><channel><title>Bing: Codeql Process Diagram</title><link>http://www.bing.com:80/search?q=Codeql+Process+Diagram</link><description>Search results</description><image><url>http://www.bing.com:80/s/a/rsslogo.gif</url><title>Codeql Process Diagram</title><link>http://www.bing.com:80/search?q=Codeql+Process+Diagram</link></image><copyright>Copyright © 2026 Microsoft. All rights reserved. These XML results may not be used, reproduced or transmitted in any manner or for any purpose other than rendering Bing results within an RSS aggregator for your personal, non-commercial use. Any other use of these results requires express written permission from Microsoft Corporation. By accessing this web page or using these results in any manner whatsoever, you agree to be bound by the foregoing restrictions.</copyright><item><title>CodeQL in Github not showing found issues for custom queries</title><link>https://stackoverflow.com/questions/79354296/codeql-in-github-not-showing-found-issues-for-custom-queries</link><description>I am running CodeQL inside a private organization with advanced security enabled. It is working good for default queries. The queries security-extended and security-and-quality are executed, result...</description><pubDate>Sat, 25 Apr 2026 01:51:00 GMT</pubDate></item><item><title>Enable/Disable CodeQL code scanning for a repo using Github Rest API</title><link>https://stackoverflow.com/questions/75433871/enable-disable-codeql-code-scanning-for-a-repo-using-github-rest-api</link><description>However, if you have already set up CodeQL code scanning manually you could maybe use the REST API endpoints for disabling and enabling the already existing code scanning workflow. Disabling CodeQL code scanning (through the REST API) seems like a rather uncommon use case. Could you explain your use case a bit more in detail?</description><pubDate>Wed, 22 Apr 2026 16:06:00 GMT</pubDate></item><item><title>Custom CodeQL query in Azure DevOps in yaml pipeline gives error: No ...</title><link>https://stackoverflow.com/questions/78520015/custom-codeql-query-in-azure-devops-in-yaml-pipeline-gives-error-no-queries-def</link><description>I want to run custom codeql queries for Advanced Security in Azure DevOps (this is a feature that is now available in Azure DevOps not only GitHub). The built in default queries like security-and-quality works fine.</description><pubDate>Tue, 21 Apr 2026 18:23:00 GMT</pubDate></item><item><title>Is there a way to exclude files from CodeQL scanning on GitHub</title><link>https://stackoverflow.com/questions/74030852/is-there-a-way-to-exclude-files-from-codeql-scanning-on-github</link><description>Is there a way to exclude files from CodeQL scanning on GitHub Ask Question Asked 3 years, 6 months ago Modified 1 year, 2 months ago</description><pubDate>Tue, 21 Apr 2026 13:08:00 GMT</pubDate></item><item><title>Github Advanced Security for Azure DevOps : CodeQL analyzer not working</title><link>https://stackoverflow.com/questions/77214815/github-advanced-security-for-azure-devops-codeql-analyzer-not-working</link><description>Find an example repo here: ghas-demo designed for GitHub workflows. However, it also applies to Azure DevOps. Just import the repo to DevOps, then create a Yaml pipeline by following the steps mentioned in Configure GitHub Advanced Security for Azure DevOps For example: pool: vmImage: ubuntu-latest steps: - task: AdvancedSecurity-Codeql-Init@1 inputs: languages: 'java' - task: AdvancedSecurity ...</description><pubDate>Thu, 23 Apr 2026 07:22:00 GMT</pubDate></item><item><title>Codeql failing to scan github repository storing only java code</title><link>https://stackoverflow.com/questions/76959231/codeql-failing-to-scan-github-repository-storing-only-java-code</link><description>Codeql failing to scan github repository storing only java code Ask Question Asked 2 years, 8 months ago Modified 2 years, 7 months ago</description><pubDate>Fri, 24 Apr 2026 23:56:00 GMT</pubDate></item><item><title>GitHub Actions CodeQL init action failed Not Found</title><link>https://stackoverflow.com/questions/75999078/github-actions-codeql-init-action-failed-not-found</link><description>I am trying to configure CodeQL scanning on my repo. For that purpose I am using the template provided by GitHub: # For most projects, this workflow file will not need changing; you simply need # to</description><pubDate>Thu, 23 Apr 2026 12:09:00 GMT</pubDate></item><item><title>CodeQL: Setting paths in Github Advanced Security for Devops</title><link>https://stackoverflow.com/questions/79288001/codeql-setting-paths-in-github-advanced-security-for-devops</link><description>By default the codeql task will scan the ENTIRE code base. Which is not what I want. How can I configure Github advanced security to only scan one project?For example the front-end and backend folder for the green-app. I tried setting the sources folder to the back-end folder. But then I'm not able to "reach" the front-end folder in the codeqlpathstoinclude parameter. When I try this:</description><pubDate>Sat, 25 Apr 2026 04:50:00 GMT</pubDate></item><item><title>java - Why does CodeQL not populate the CodeQL database with a Gradle ...</title><link>https://stackoverflow.com/questions/77370117/why-does-codeql-not-populate-the-codeql-database-with-a-gradle-build</link><description>Since CodeQL needs to trace the compiler invocations that happen to create its' database, you should disable the gradle daemon: Checkout the sample from these CodeQL docs: "Specifying build commands". Use --no-daemon because a build delegated to an existing daemon cannot be detected by CodeQL.</description><pubDate>Fri, 24 Apr 2026 17:15:00 GMT</pubDate></item><item><title>Configuring CodeQL with Github actions using well known weaknesses</title><link>https://stackoverflow.com/questions/72384905/configuring-codeql-with-github-actions-using-well-known-weaknesses</link><description>Configuring CodeQL with Github actions using well known weaknesses Asked 3 years, 11 months ago Modified 3 years, 3 months ago Viewed 7k times</description><pubDate>Fri, 24 Apr 2026 11:25:00 GMT</pubDate></item></channel></rss>