ci(codeql): exclude vendor/dist from analysis#7349
Conversation
The vendor/dist directory contains bundled dependencies that don't need to be scanned as part of the project's code analysis.
Overall package sizeSelf size: 4.45 MB Dependency sizes| name | version | self size | total size | |------|---------|-----------|------------| | import-in-the-middle | 2.0.3 | 76.87 kB | 808.03 kB | | dc-polyfill | 0.1.10 | 26.73 kB | 26.73 kB |🤖 This report was automatically generated by heaviest-objects-in-the-universe |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #7349 +/- ##
=======================================
Coverage 86.16% 86.16%
=======================================
Files 515 515
Lines 22234 22234
=======================================
Hits 19157 19157
Misses 3077 3077 Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
BenchmarksBenchmark execution time: 2026-01-27 07:03:54 Comparing candidate commit 6756039 in PR branch Found 0 performance improvements and 0 performance regressions! Performance is the same for 231 metrics, 29 unstable metrics. |
The vendor/dist directory contains bundled dependencies that don't need to be scanned as part of the project's code analysis.
The vendor/dist directory contains bundled dependencies that don't need to be scanned as part of the project's code analysis.
The vendor/dist directory contains bundled dependencies that don't need to be scanned as part of the project's code analysis.

What does this PR do?
Excludes the
vendor/distdirectory from CodeQL analysis by adding it to the paths-ignore list in.github/codeql_config.yml.Motivation
The
vendor/distdirectory contains bundled third-party dependencies that are already analyzed upstream. Including them in CodeQL scans adds noise and increases analysis time without providing meaningful security insights for our project's code.