diff --git a/README.md b/README.md index 6461bed..b7509b6 100644 --- a/README.md +++ b/README.md @@ -19,9 +19,9 @@ The following links contain the content that will be covered during the workshop ## :mega: Prerequisites - Install [Visual Studio Code](https://code.visualstudio.com/). -- Install the [CodeQL extension for Visual Studio Code](https://help.semmle.com/codeql/codeql-for-vscode/procedures/setting-up.html). +- Install the [CodeQL extension for Visual Studio Code](https://docs.github.com/en/code-security/codeql-for-vs-code/getting-started-with-codeql-for-vs-code/installing-codeql-for-vs-code). - You do _not_ need to install the CodeQL CLI: the extension will handle this for you. -- Set up the [CodeQL starter workspace](https://help.semmle.com/codeql/codeql-for-vscode/procedures/setting-up.html#using-the-starter-workspace). +- Set up the [CodeQL starter workspace](https://github.com/github/vscode-codeql-starter). - **Important:** Don't forget to use `git clone --recursive` or `git submodule update --init --remote` to update the submodules when you clone this repository. This allows you to obtain the standard CodeQL query libraries. - Open the starter workspace in Visual Studio Code: **File** > **Open Workspace** > Browse to `vscode-codeql-starter/vscode-codeql-starter.code-workspace` in your checkout of the starter workspace. - Download and add the CodeQL database to be used in the workshop: @@ -34,9 +34,9 @@ The following links contain the content that will be covered during the workshop - Choose the unzipped database directory on your filesystem. ## :books: Resources -- [Learning CodeQL](https://help.semmle.com/QL/learn-ql) -- [Learning CodeQL for Java](https://help.semmle.com/QL/learn-ql/java/ql-for-java.html) -- [Learning CodeQL for JavaScript](https://help.semmle.com/QL/learn-ql/javascript/ql-for-javascript.html) -- [Using the CodeQL extension for VS Code](https://help.semmle.com/codeql/codeql-for-vscode.html) -- More about CodeQL on [GitHub Security Lab](https://securitylab.github.com/tools/codeql) +- [CodeQL docs](https://codeql.github.com/docs/) +- [CodeQL for Java](https://codeql.github.com/docs/codeql-language-guides/codeql-for-java/) +- [CodeQL for JavaScript](https://codeql.github.com/docs/codeql-language-guides/codeql-for-javascript/) +- [CodeQL for Visual Studio Code](https://codeql.github.com/docs/codeql-for-visual-studio-code/) +- More about CodeQL on [GitHub Security Lab](https://securitylab.github.com/get-involved/) - CodeQL on [GitHub Learning Lab](https://lab.github.com/githubtraining/codeql-u-boot-challenge-(cc++)) diff --git a/java.md b/java.md index a5df56a..1529f02 100644 --- a/java.md +++ b/java.md @@ -453,8 +453,8 @@ For more information on how the vulnerability was identified, you can read the [ Although we have created a query from scratch to find this problem, it can also be found with one of our default security queries, [UnsafeDeserialization.ql](https://github.com/github/codeql/blob/master/java/ql/src/Security/CWE/CWE-502/UnsafeDeserialization.ql). You can see this on a [vulnerable copy of Apache Struts](https://github.com/m-y-mo/struts_9805) that has been [analyzed on LGTM.com](https://lgtm.com/projects/g/m-y-mo/struts_9805/snapshot/31a8d6be58033679a83402b022bb89dad6c6e330/files/plugins/rest/src/main/java/org/apache/struts2/rest/handler/XStreamHandler.java?sort=name&dir=ASC&mode=heatmap#x121788d71061ed86:1), our free open source analysis platform. ## What's next? -- Read the [tutorial on analyzing data flow in Java](https://help.semmle.com/QL/learn-ql/java/dataflow.html). -- Go through more [CodeQL training materials for Java](https://help.semmle.com/QL/learn-ql/ql-training.html#codeql-and-variant-analysis-for-java). +- Read the [tutorial on analyzing data flow in Java](https://codeql.github.com/docs/codeql-language-guides/analyzing-data-flow-in-java/#analyzing-data-flow-in-java). +- Go through more [CodeQL training materials for Java](https://codeql.github.com/docs/codeql-language-guides/codeql-for-java/). - Try out the latest CodeQL Java Capture-the-Flag challenge on the [GitHub Security Lab website](https://securitylab.github.com/ctf) for a chance to win a prize! Or try one of the older Capture-the-Flag challenges to improve your CodeQL skills. - Try out a CodeQL course on [GitHub Learning Lab](https://lab.github.com/githubtraining/codeql-u-boot-challenge-(cc++)). - Read about more vulnerabilities found using CodeQL on the [GitHub Security Lab research blog](https://securitylab.github.com/research).