此版本的 GitHub Enterprise 已停止服务 2022-10-12. 即使针对重大安全问题,也不会发布补丁。 为了获得更好的性能、更高的安全性和新功能,请升级到最新版本的 GitHub Enterprise。 如需升级帮助,请联系 GitHub Enterprise 支持。
自动扫描代� �以查找漏洞和错误
Code scanning is available for organization-owned repositories in GitHub Enterprise Server. This feature requires a license for GitHub Advanced Security. 有关详细信息,请参阅“关于 GitHub Advanced Security”。
关于代� �扫描
���( code scanning ( GitHub �~y�-��h���
About code scanning alerts
Learn about the different types of code scanning alerts and the information that helps you understand the problem each alert highlights.
Triaging code scanning alerts in pull requests
When code scanning identifies a problem in a pull request, you can review the highlighted code and resolve the alert.
Setting up code scanning for a repository
You can set up code scanning by adding a workflow to your repository.
Managing code scanning alerts for your repository
From the security view, you can view, fix, or dismiss alerts for potential vulnerabilities or errors in your project's code.
Configuring code scanning
You can configure how GitHub scans the code in your project for vulnerabilities and errors.
About code scanning with CodeQL
You can use CodeQL to identify vulnerabilities and errors in your code. The results are shown as code scanning alerts in GitHub.
推荐用于运行 CodeQL 的硬件资源
9n���'�P(�X���: �L CodeQL ���RAMCPU �8���
Configuring the CodeQL workflow for compiled languages
You can configure how GitHub uses the CodeQL analysis workflow to scan code written in compiled languages for vulnerabilities and errors.
Troubleshooting the CodeQL workflow
If you're having problems with code scanning, you can troubleshoot by using these tips for resolving issues.
Running CodeQL code scanning in a container
You can run code scanning in a container by ensuring that all processes run in the same container.
Viewing code scanning logs
You can view the output generated during code scanning analysis in your GitHub Enterprise Server instance.