Consider releasing Roslyn Analyzers and Fixers
See original GitHub issueRoslyn analyzers and fixers work as part of the compiler and can be used in any IDE or tooling the supports Roslyn analyzers.
The Roslyn compilers can output diagnostics in SARIF formant (-errorLog
) that can be used by other tooling.
Issue Analytics
- State:
- Created 3 years ago
- Comments:7 (7 by maintainers)
Top Results From Across the Web
Release tracking analyzer
Release tracking analyzer provides the diagnostics and code fixes to enable analyzer authors to maintain the shipped and unshipped files.
Read more >Analyzer configuration - Visual Studio (Windows)
Learn how to customize Roslyn analyzer rules. See how to adjust analyzer severities, suppress violations, and designate files as generated ...
Read more >Roslyn Analyzers - YouTube
Chapters 00:00 - Introduction and an overview of Roslyn and analyzers 02:15 - Demo of analyzers and suggested code fixes 05:00 - Using ......
Read more >Roslyn analyzers and code fixes in OmniSharp and VS Code
The overall performance is not the best, but it will improve long term. Analyzers are not shadow copied which can lead to lock...
Read more >Visual Studio 8.8 doesn't run Roslyn analyzers installed in ...
I created a Roslyn analyzer and installed it in a project using <Analyzer /> reference. ... A fix for this issue has been...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
@paulomorgado Just to add a little to this – static analyzers make tradeoffs in different areas – the advantage of Roslyn analyzers are execution speed, disadvantages (IMHO) are complexity of rule creation and the languages that can be analyzed. CodeQL isn’t usually as performant, but enables for a much deeper analysis, and still a relatively high cost of rule creation.
DevSkim goes at it from the other direction – rules are very easy to write and are language agnostic. This means that yes, it’s easy to “trick” DevSkim into not finding an issue, and there can be more false positives.
There’s no “best” tool for all jobs – we think that DevSkim has a useful spot in the mix, similar to Semgrep, but we don’t want to try to make DevSkim something that it isn’t.
If your original comment was about creating new Roslyn rules to detect more security bugs, that would always be helpful, but it isn’t something that we (the folks managing DevSkim) are actively working on. You might want to consider security-code-scan (NuGet) in case they’ve already implemented what you’re looking for.
Thanks.