-
Notifications
You must be signed in to change notification settings - Fork 8.1k
Add CodeQL suppressions for PowerShell intended behavior #25359
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add CodeQL suppressions for PowerShell intended behavior #25359
Conversation
|
/azp run PowerShell-CI-linux-packaging, PowerShell-Windows-Packaging-CI |
|
Azure Pipelines could not run because the pipeline triggers exclude this branch/path. |
Head branch was pushed to by a user without write access
|
/azp run PowerShell-CI-linux-packaging, PowerShell-Windows-Packaging-CI |
|
Azure Pipelines could not run because the pipeline triggers exclude this branch/path. |
|
📣 Hey @@anamnavi, how did we do? We would love to hear your feedback with the link below! 🗣️ 🔗 https://aka.ms/PSRepoFeedback |
|
@PowerShell/powershell-maintainers triage decision - required infrastructure change |
PR Summary
This pull request includes several comments added to the code to address CodeQL warnings in the PowerShell codebase. The comments explain why the flagged issues are expected behavior and not security concerns.
Key changes include:
AddType.cs:WebRequestPSCmdlet.Common.cs:ExecutionContext.cs:PR Context
PR Checklist
.h,.cpp,.cs,.ps1and.psm1files have the correct copyright header