{"id":6446,"date":"2019-09-21T11:00:08","date_gmt":"2019-09-21T11:00:08","guid":{"rendered":"https:\/\/gtechbooster.com\/?p=6446"},"modified":"2023-06-21T11:42:54","modified_gmt":"2023-06-21T11:42:54","slug":"github-acquires-code-analysis-company-semmle","status":"publish","type":"post","link":"https:\/\/gtechbooster.com\/github-acquires-code-analysis-company-semmle\/","title":{"rendered":"GitHub acquires code analysis company &#8211; Semmle"},"content":{"rendered":"\n<p>GitHub has acquired code analysis company &#8211; Semmle, and will make  Semmle&#8217;s code analysis engine available to all public repositories with this acquisition.  GitHub has become a Common Vulnerabilities and Exposures (CVE)  Numbering Authority, making it easier to report vulnerabilities directly  from your repositories.<\/p>\n\n\n\n<div class=\"gtech-migrated-from-ad-inserter-placement-2\" style=\"text-align: center;\" id=\"gtech-3945195855\"><div style=\"margin-right: auto;margin-left: auto;text-align: center;\" id=\"gtech-306316650\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/75343\" rel=\"noopener\" class=\"notrack\" aria-label=\"jesdphis\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2025\/08\/jesdphis.avif\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2025\/08\/jesdphis.avif 1179w, https:\/\/gtechbooster.com\/media\/2025\/08\/jesdphis-768x950.avif 768w\" sizes=\"(max-width: 1179px) 100vw, 1179px\" width=\"300\" height=\"300\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div><p>Semmle&#8217;s main product, QL, is a code analysis tool that you can use  to find potential vulnerabilities in your code. It has a query language  that you can use to write and execute QL queries locally from most IDEs  using a QL plugin, or there&#8217;s a query console for use in your web  browser.\u00a0 The Semmle team says QL performs variant analysis, where a  known vulnerability is used as a seed\u00a0to find similar problems in your  code. QL ships with libraries to perform control and data flow analysis,  taint tracking and explore known threat models. Supported languages  include C\/C++, C#, Java, JavaScript, and Python.<\/p>\n\n\n\n<p>QL is also used in Semmle\u2019s other main product,&nbsp;LGTM (Looks Good to \nMe). which analyses every commit to identify vulnerabilities early.&nbsp;LGTM\n automatically runs over 1,600 standard analyses on every code change. \nGitHub plans to make QL available via GitHub Actions. According to \nSemmle more than 100 open source CVEs have been found using QL.<\/p>\n\n\n\n<p>In a related announcement, GitHub said it has become a CVE Numbering \nAuthority for open source projects. Common Vulnerabilities and Exposures\n (CVE) Numbering Authorities are authorized to assign CVE IDs to \nvulnerabilities affecting products in a particular area &#8211; open source \nprojects in this case. The CVE IDs are then included in first-time \npublic announcements of new vulnerabilities.&nbsp; The fact that GitHub is a \nCVE Numbering Authority will make it easier for code maintainers to \nreport vulnerabilities directly from their repositories. GitHub will \nassign a CVE ID, post to the CVE List, and then to the National \nVulnerability Database (NVD) on a developer\u2019s behalf.<\/p>\n\n\n\n<p>Commenting on the announcements, Shanku Niyogi, GitHub SVP, said:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>&#8220;We believe that fast, unfettered movement of vulnerability data is critical to improving software security&#8221;<\/em><\/p><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">More Information<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/semmle.com\/\">Semmle Homepage<\/a><\/li><li><a href=\"https:\/\/github.com\/\">GitHub Homepage<\/a><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Vulnerability Hunting: Quest for an Exploit using QL\" width=\"1290\" height=\"726\" src=\"https:\/\/www.youtube.com\/embed\/irrYp3wdtsw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><figcaption>Semmle:  <em>Vulnerability Hunting: Quest for an Exploit using QL <\/em><\/figcaption><\/figure>\n\n\n\n<p>Credit: I Programmer<\/p>\n<div class=\"gtech-end-cont\" id=\"gtech-2687317947\"><div style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"gtech-4246196015\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/78935\" rel=\"noopener\" class=\"notrack\" aria-label=\"auyvc003\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2026\/03\/auyvc003.webp\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2026\/03\/auyvc003.webp 1200w, https:\/\/gtechbooster.com\/media\/2026\/03\/auyvc003-768x768.webp 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"500\" height=\"500\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>GitHub will make Semmle&#8217;s code analysis engine available to all public repositories with this acquisition. GitHub has become a Common Vulnerabilities and&#8230;..<\/p>\n","protected":false},"author":7,"featured_media":6447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1915],"tags":[359,6,794,1015],"class_list":["post-6446","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ndocs","tag-github","tag-programming","tag-software-testing","tag-static-program-analysis"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/6446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/comments?post=6446"}],"version-history":[{"count":0,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/6446\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media\/6447"}],"wp:attachment":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media?parent=6446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/categories?post=6446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/tags?post=6446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}