* New Crowdin translations by Github Action * Remove bad translations * Remove broken translations * Remove more broken files * Remove broken translation * Remove broken translations * Remove broken translations * Add english versions of broken translations Co-authored-by: Crowdin Bot <support+bot@crowdin.com> Co-authored-by: Chiedo <chiedo@users.noreply.github.com>
32 lines
1.5 KiB
Markdown
32 lines
1.5 KiB
Markdown
<table spaces-before="0" line-breaks-before="1">
|
|
<tr>
|
|
<th>
|
|
<nobr>Type of analysis</nobr>
|
|
</th>
|
|
|
|
<th>
|
|
Options for generating alerts
|
|
</th>
|
|
</tr>
|
|
|
|
<tr>
|
|
<td>
|
|
{% data variables.product.prodname_codeql %}
|
|
</td>
|
|
|
|
<td>
|
|
Using {% data variables.product.prodname_actions %} (see "<a href="/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository#enabling-code-scanning-using-actions">Enabling {% data variables.product.prodname_code_scanning %} using actions</a>") or using the {% data variables.product.prodname_codeql_runner %} in a third-party continuous integration (CI) system (see "<a href="/github/finding-security-vulnerabilities-and-errors-in-your-code/running-code-scanning-in-your-ci-system">Running code scanning in your CI system</a>").
|
|
</td>
|
|
</tr>
|
|
|
|
<tr>
|
|
<td>
|
|
Third‑party
|
|
</td>
|
|
|
|
<td>
|
|
Using {% data variables.product.prodname_actions %} (see "<a href="/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository#enabling-code-scanning-using-actions">Enabling {% data variables.product.prodname_code_scanning %} using actions</a>") or generated externally and uploaded to {% data variables.product.product_name %} (see "<a href="/github/finding-security-vulnerabilities-and-errors-in-your-code/uploading-a-sarif-file-to-github">Uploading a SARIF file to {% data variables.product.prodname_dotcom %}</a>").
|
|
</td>
|
|
</tr>
|
|
</table>
|