close
The Wayback Machine - https://web.archive.org/web/20211027055935/https://github.com/github/roadmap/issues/206
Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Swift security analysis support in CodeQL code scanning (beta) #206

Open
github-product-roadmap opened this issue Jun 9, 2021 · 0 comments
Open

Comments

@github-product-roadmap
Copy link
Collaborator

@github-product-roadmap github-product-roadmap commented Jun 9, 2021

Summary

CodeQL is the analysis engine that provides the vast majority of our code scanning results. In the second half of CY2022, we're aiming to release Swift support in public beta.

Intended Outcome

Looking at language popularity data on GitHub.com, Swift is a very popular language both within the open source community and with our enterprise customers — mostly for creating mobile apps for iOS. Building Swift support for CodeQL means that we'll be able to flag up security alerts in your Swift codebases.

How will it work?

Analyzing Swift codebases with CodeQL in code scanning will work much the same as scanning other source code in languages that we already support. After you've set up CodeQL analysis in an Actions workflow on a Swift repository, the analysis job will be triggered as configured. As soon as the analysis is finished, the CodeQL results will then become visible to you in the "Security" tab and on pull requests.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Linked pull requests

Successfully merging a pull request may close this issue.

None yet
2 participants