CodeQL 2.24.0 adds Swift 6.2 and .NET 10 support, and improves file handling for minified JavaScript
Source: GitHub Changelog
CodeQL is the static analysis engine behind GitHub code scanning, which finds and remediates security issues in your code. We’ve recently released CodeQL 2.24.0, which adds support for new language versions, expands framework coverage, and improves query accuracy across multiple languages.
Language and framework support
Swift
- Updated to support analysis of apps built with Swift 6.2.2 and 6.2.3.
C#
- Added support for .NET 10 and C# 14.
JavaScript/TypeScript
-
JavaScript files with an average line length greater than 200 are now treated as minified and won’t be analyzed.
To analyze minified files, set the environment variable:CODEQL_EXTRACTOR_JAVASCRIPT_ALLOW_MINIFIED_FILES=true -
Added support for Next.js 16’s
use cachedirectives. -
Added support for the React
useRefhook, with improved data‑flow tracking through thecurrentproperty.
Python
- The
py/decompression-bombquery now supports thecompression.zstdlibrary (added in Python 3.14). - Added taint‑flow models for
urllib.parseand remote flow sources for thepython-socketiopackage. - The extractor now analyzes files in hidden directories by default.
Java/Kotlin
- Added sink models for
com.couchbasesupporting SQL injection and hard‑coded credentials queries. - Added more data‑flow models for
org.apache.commons.fileupload.FileItem,javax/jakarta.servlet.http.Part, andorg.apache.commons.fileupload.util.Streams.
C/C++
- Added support for more Windows APIs, including file‑read functions, command‑line and environment‑variable APIs, and flow models for SQLite and OpenSSL libraries.
Rust
- Method resolution now considers the
Dereftrait, correctly resolving method calls on receivers implementingDeref. - Added support for the Axum web application framework.
- Improved type inference for raw pointers, including raw borrow operators and dereferencing.
Query changes
C#
- Extended the Missing cross‑site request forgery token validation query to support ASP.NET Core.
- Added
NHibernate.ISession.CreateSQLQuery,NHibernate.IStatelessSession.CreateSQLQuery, andNHibernate.Impl.AbstractSessionImpl.CreateSQLQueryas SQL‑injection sinks. - Added implicit reads of
System.Collections.Generic.KeyValuePair.Valueat taint‑tracking sinks and at inputs to additional taint steps, resulting in more results when a container is tainted.
JavaScript/TypeScript
- Fixed a bug in the Next.js model that caused analysis to miss server‑side taint sources in files named
routeorpageoutsideapiandpagesfolders. new Response(x)is no longer treated as a reflected XSS sink when nocontent-typeheader is set (defaults totext/plain).
Java/Kotlin
- Java thread‑safety analysis now understands initialization to thread‑safe classes inside constructors.
- Added a sanitizer to
java/ssrfto suppress alerts when a regular‑expression check verifies the value is safe. - URI template variables of all Spring
RestTemplatemethods are now considered request‑forgery sinks, potentially generating more alerts forjava/ssrf.
C/C++
- Improved the accuracy of the
cpp/constant-comparisonquery to reduce false positives.
Rust
- Improved the accuracy of the
rust/unused-variable,rust/unused-value,rust/access-invalid-pointer, andrust/access-after-lifetime-endedqueries to reduce false positives. - Extended the
rust/hard-coded-cryptographic-valuequery with new heuristic sinks identifying passwords, initialization vectors, nonces, and salts.
For a full list of changes, please refer to the complete changelog for version 2.24.0. Every new version of CodeQL is automatically deployed to users of GitHub code scanning on github.com. The new functionality in CodeQL 2.24.0 will also be included in a future GitHub Enterprise Server (GHES) release. If you use an older version of GHES, you can manually upgrade your CodeQL version.