37 lines
1.9 KiB
Markdown
37 lines
1.9 KiB
Markdown
---
|
|
title: Finding security vulnerabilities and errors in your code
|
|
shortTitle: Secure coding
|
|
intro: 'Keep your code secure by using {% data variables.product.prodname_code_scanning %} to identify and fix potential security vulnerabilities and other errors in your code.'
|
|
product: '{% data reusables.gated-features.code-scanning %}'
|
|
redirect_from:
|
|
- /github/managing-security-vulnerabilities/finding-security-vulnerabilities-in-your-projects-code
|
|
- /github/finding-security-vulnerabilities-and-errors-in-your-code
|
|
versions:
|
|
free-pro-team: '*'
|
|
enterprise-server: '>=3.0'
|
|
github-ae: '*'
|
|
topics:
|
|
- Security
|
|
---
|
|
<!--For this article in earlier GHES versions, see /content/github/finding-security-vulnerabilities-and-errors-in-your-code-->
|
|
|
|
### Table of Contents
|
|
|
|
{% topic_link_in_list /automatically-scanning-your-code-for-vulnerabilities-and-errors %}
|
|
{% link_in_list /about-code-scanning %}
|
|
{% link_in_list /triaging-code-scanning-alerts-in-pull-requests %}
|
|
{% link_in_list /setting-up-code-scanning-for-a-repository %}
|
|
{% link_in_list /managing-code-scanning-alerts-for-your-repository %}
|
|
{% link_in_list /configuring-code-scanning %}
|
|
{% link_in_list /configuring-the-codeql-workflow-for-compiled-languages %}
|
|
{% link_in_list /troubleshooting-the-codeql-workflow %}
|
|
{% link_in_list /running-codeql-code-scanning-in-a-container %}
|
|
{% topic_link_in_list /integrating-with-code-scanning %}
|
|
{% link_in_list /about-integration-with-code-scanning %}
|
|
{% link_in_list /uploading-a-sarif-file-to-github %}
|
|
{% link_in_list /sarif-support-for-code-scanning %}
|
|
{% topic_link_in_list /using-codeql-code-scanning-with-your-existing-ci-system %}
|
|
{% link_in_list /running-codeql-code-scanning-in-your-ci-system %}
|
|
{% link_in_list /configuring-codeql-code-scanning-in-your-ci-system %}
|
|
{% link_in_list /troubleshooting-codeql-code-scanning-in-your-ci-system %}
|