Skip to content

Latest commit

 

History

History
575 lines (482 loc) · 40.1 KB

sarif-support-for-code-scanning.md

File metadata and controls

575 lines (482 loc) · 40.1 KB
title shortTitle intro product redirect_from versions type topics
SARIF support for code scanning
SARIF support
To display results from a third-party static analysis tool in your repository on {% data variables.product.prodname_dotcom %}, you'll need your results stored in a SARIF file that supports a specific subset of the SARIF 2.1.0 JSON schema for {% data variables.product.prodname_code_scanning %}. If you use the default {% data variables.product.prodname_codeql %} static analysis engine, then your results will display in your repository on {% data variables.product.prodname_dotcom %} automatically.
{% data reusables.gated-features.code-scanning %}
/github/finding-security-vulnerabilities-and-errors-in-your-code/about-sarif-support-for-code-scanning
/github/finding-security-vulnerabilities-and-errors-in-your-code/sarif-support-for-code-scanning
/code-security/secure-coding/sarif-support-for-code-scanning
/code-security/secure-coding/integrating-with-code-scanning/sarif-support-for-code-scanning
/github/finding-security-vulnerabilities-and-errors-in-your-code/integrating-with-code-scanning/sarif-support-for-code-scanning
fpt ghes ghec
*
*
*
reference
Advanced Security
Code scanning
Integration
SARIF

About SARIF support

SARIF (Static Analysis Results Interchange Format) is an OASIS Standard that defines an output file format. The SARIF standard is used to streamline how static analysis tools share their results. {% data variables.product.prodname_code_scanning_caps %} supports a subset of the SARIF 2.1.0 JSON schema.

To upload a SARIF file from a third-party static code analysis engine, you'll need to ensure that uploaded files use the SARIF 2.1.0 version. {% data variables.product.prodname_dotcom %} will parse the SARIF file and show alerts using the results in your repository as a part of the {% data variables.product.prodname_code_scanning %} experience. For more information, see "AUTOTITLE." For more information about the SARIF 2.1.0 JSON schema, see sarif-schema-2.1.0.json.

If you're using {% data variables.product.prodname_actions %} with the {% data variables.code-scanning.codeql_workflow %} or using the {% data variables.product.prodname_codeql_cli %}, then the {% data variables.product.prodname_code_scanning %} results will automatically use the supported subset of SARIF 2.1.0. For more information, see "AUTOTITLE" or "AUTOTITLE."

{% data variables.product.prodname_dotcom %} uses properties in the SARIF file to display alerts. For example, the shortDescription and fullDescription appear at the top of a {% data variables.product.prodname_code_scanning %} alert. The location allows {% data variables.product.prodname_dotcom %} to show annotations in your code file. For more information, see "AUTOTITLE."

If you're new to SARIF and want to learn more, see Microsoft's SARIF tutorials repository.

Providing data to track {% data variables.product.prodname_code_scanning %} alerts across runs

Each time the results of a new code scan are uploaded, the results are processed and alerts are added to the repository. To prevent duplicate alerts for the same problem, {% data variables.product.prodname_code_scanning %} uses fingerprints to match results across various runs so they only appear once in the latest run for the selected branch. This makes it possible to match alerts to the correct line of code when files are edited. The ruleID for a result has to be the same across analysis.

Reporting consistent filepaths

The filepath has to be consistent across the runs to enable a computation of a stable fingerprint. If the filepaths differ for the same result, each time there is a new analysis a new alert will be created, and the old one will be closed. This will cause having multiple alerts for the same result.

Including data for fingerprint generation

{% data variables.product.prodname_dotcom %} uses the partialFingerprints property in the OASIS standard to detect when two results are logically identical. For more information, see the "partialFingerprints property" entry in the OASIS documentation.

SARIF files created by the {% data variables.code-scanning.codeql_workflow %}, or using the {% data variables.product.prodname_codeql_cli %} include fingerprint data. If you upload a SARIF file using the upload-sarif action and this data is missing, {% data variables.product.prodname_dotcom %} attempts to populate the partialFingerprints field from the source files. For more information about uploading results, see "AUTOTITLE."

If you upload a SARIF file without fingerprint data using the /code-scanning/sarifs API endpoint, the {% data variables.product.prodname_code_scanning %} alerts will be processed and displayed, but users may see duplicate alerts. To avoid seeing duplicate alerts, you should calculate fingerprint data and populate the partialFingerprints property before you upload the SARIF file. You may find the script that the upload-sarif action uses a helpful starting point: https://github.com/github/codeql-action/blob/main/src/fingerprints.ts. For more information about the API, see "AUTOTITLE."

Understanding rules and results

SARIF files support both rules and results. The information stored in these elements is similar but serves different purposes.

  • Rules are an array of reportingDescriptor objects that are included in the toolComponent object. This is where you store details of the rules that are run during analysis. Information in these objects should change infrequently, typically when you update the tool.

  • Results are stored as a series of result objects under results in the run object. Each result object contains details for one alert in the codebase. Within the results object, you can reference the rule that detected the alert.

When you compare SARIF files generated by analyzing different codebases with the same tool and rules, you should see differences in the results of the analyses but not in the rules.

Specifying the location for source files

Specifying source file locations and lines of code ensures code scanning alerts are displayed accurately within the file containing the identified problem, allowing for targeted issue resolution.

This precision enhances the efficiency of code review and resolution processes, streamlining development workflows by enabling developers to address issues directly in the context of their codebase.

{% ifversion code-scanning-alerts-in-pr-diff %}

{% data variables.product.prodname_code_scanning_caps %} will also display alerts in pull request check results when all the lines of code identified by the alert exist in the pull request diff.

For display in a pull request check, an alert must meet all the following conditions:

  • All the lines of code identified by the alert exist in the pull request diff, including the first line of the alert.
  • The alert must exist in the lines of code added or edited in the pull request, not lines that were deleted.

The physicalLocation object in a submitted SARIF file identifies the lines of code for an alert. For more information, see "physicalLocation object."

{% endif %}

Specifying the root for source files

{% data variables.product.prodname_code_scanning_caps %} interprets results that are reported with relative paths as relative to the root of the repository analyzed. If a result contains an absolute URI, the URI is converted to a relative URI. The relative URI can then be matched against a file committed to the repository.

You can provide the source root for conversion from absolute to relative URIs in one of the following ways.

If you provide a source root, any location of an artifact specified using an absolute URI must use the same URI scheme. If there is a mismatch between the URI scheme for the source root and one or more of the absolute URIs, the upload is rejected.

For example, a SARIF file is uploaded using a source root of file:///github/workspace.

# Conversion of absolute URIs to relative URIs for location artifacts

file:///github/workspace/src/main.go -> src/main.go
file:///tmp/go-build/tmp.go          -> file:///tmp/go-build/tmp.go

The file is successfully uploaded as both absolute URIs use the same URI scheme as the source root.

Resolving symlinks before generating SARIF results

If the relative URI for a result is matched against a file defined using a symlink, code scanning is unable to display the result. So you need to resolve any symlinked files, and report any results in those files using the resolved URI.

Validating your SARIF file

You can check a SARIF file is compatible with {% data variables.product.prodname_code_scanning %} by testing it against the {% data variables.product.prodname_dotcom %} ingestion rules. For more information, visit the Microsoft SARIF validator.

For each gzip-compressed SARIF file, SARIF upload supports a maximum size of 10 MB. Any uploads over this limit will be rejected. If your SARIF file is too large because it contains too many results, you should update the configuration to focus on results for the most important rules or queries. For more information, see "AUTOTITLE."

{% data variables.product.prodname_code_scanning_caps %} supports uploading a maximum number of entries for the data objects in the following table. If any of these objects exceeds its maximum value the SARIF file is rejected. For some objects, there is also an additional limit on the number of values that will be displayed. Whenever possible the most important values are shown. To get the most out of your analysis when it includes data above the supported limits, try to optimize the analysis configuration (for example, for the {% data variables.product.prodname_codeql %} tool, identify and disable the most noisy queries). For more information, see "AUTOTITLE."

{% data reusables.code-scanning.sarif-limits %}

For information about other errors, see "AUTOTITLE"

Uploading more than one SARIF file for a commit

You can upload multiple SARIF files for the same commit, and display the data from each file as {% data variables.product.prodname_code_scanning %} results. When you upload multiple SARIF files for a commit, you must indicate a "category" for each analysis. The way to specify a category varies according to the analysis method:

  • Using the {% data variables.product.prodname_codeql_cli %} directly, pass the --sarif-category argument to the codeql database analyze command when you generate SARIF files. For more information, see "AUTOTITLE."
  • Using {% data variables.product.prodname_actions %} with codeql-action/analyze, the category is set automatically from the workflow name and any matrix variables (typically, language). You can override this by specifying a category input for the action, which is useful when you analyze different sections of a monorepo in a single workflow.
  • Using {% data variables.product.prodname_actions %} to upload results from other static analysis tools, then you must specify a category input if you upload more than one file of results for the same tool in one workflow. For more information, see "AUTOTITLE."
  • If you are not using either of these approaches, you must specify a unique runAutomationDetails.id in each SARIF file to upload. For more information about this property, see "runAutomationDetails object."

If you upload a second SARIF file for a commit with the same category and from the same tool, the earlier results are overwritten. However, if you try to upload multiple SARIF files for the same tool and category in a single {% data variables.product.prodname_actions %} workflow run, the misconfiguration is detected and the run will fail.

Supported SARIF output file properties

If you use a code analysis engine other than {% data variables.product.prodname_codeql %}, you can review the supported SARIF properties to optimize how your analysis results will appear on {% data variables.product.prodname_dotcom %}.

{% note %}

Note: You must supply an explicit value for any property marked as "required". The empty string is not supported for required properties.

{% endnote %}

Any valid SARIF 2.1.0 output file can be uploaded, however, {% data variables.product.prodname_code_scanning %} will only use the following supported properties.

sarifLog object

Name Required Description
$schema {% octicon "check" aria-label="Required" %} The URI of the SARIF JSON schema for version 2.1.0. For example, https://json.schemastore.org/sarif-2.1.0.json.
version {% octicon "check" aria-label="Required" %} {% data variables.product.prodname_code_scanning_caps %} only supports SARIF version 2.1.0.
runs[] {% octicon "check" aria-label="Required" %} A SARIF file contains an array of one or more runs. Each run represents a single run of an analysis tool. For more information about a run, see the run object.

run object

{% data variables.product.prodname_code_scanning_caps %} uses the run object to filter results by tool and provide information about the source of a result. The run object contains the tool.driver tool component object, which contains information about the tool that generated the results. Each run can only have results for one analysis tool.

Name Required Description
tool.driver {% octicon "check" aria-label="Required" %} A toolComponent object that describes the analysis tool. For more information, see the toolComponent object.
tool.extensions[] {% octicon "x" aria-label="Optional" %} An array of toolComponent objects that represent any plugins or extensions used by the tool during analysis. For more information, see the toolComponent object.
invocation.workingDirectory.uri {% octicon "x" aria-label="Optional" %} This field is used only when checkout_uri (SARIF upload API only) or checkout_path ({% data variables.product.prodname_actions %} only) are not provided. The value is used to convert absolute URIs used in physicalLocation objects to relative URIs. For more information, see "Specifying the root for source files."
results[] {% octicon "check" aria-label="Required" %} The results of the analysis tool. {% data variables.product.prodname_code_scanning_caps %} displays the results on {% data variables.product.prodname_dotcom %}. For more information, see the result object.

toolComponent object

Name Required Description
name {% octicon "check" aria-label="Required" %} The name of the analysis tool. {% data variables.product.prodname_code_scanning_caps %} displays the name on {% data variables.product.prodname_dotcom %} to allow you to filter results by tool.
version {% octicon "x" aria-label="Optional" %} The version of the analysis tool. {% data variables.product.prodname_code_scanning_caps %} uses the version number to track when results may have changed due to a tool version change rather than a change in the code being analyzed. If the SARIF file includes the semanticVersion field, version is not used by {% data variables.product.prodname_code_scanning %}.
semanticVersion {% octicon "x" aria-label="Optional" %} The version of the analysis tool, specified by the Semantic Versioning 2.0 format. {% data variables.product.prodname_code_scanning_caps %} uses the version number to track when results may have changed due to a tool version change rather than a change in the code being analyzed. If the SARIF file includes the semanticVersion field, version is not used by {% data variables.product.prodname_code_scanning %}. For more information, see "Semantic Versioning 2.0.0" in the Semantic Versioning documentation.
rules[] {% octicon "check" aria-label="Required" %} An array of reportingDescriptor objects that represent rules. The analysis tool uses rules to find problems in the code being analyzed. For more information, see the reportingDescriptor object.

reportingDescriptor object

This is where you store details of the rules that are run during analysis. Information in these objects should change infrequently, typically when you update the tool. For more information, see "Understanding rules and results" above.

Name Required Description
id {% octicon "check" aria-label="Required" %} A unique identifier for the rule. The id is referenced from other parts of the SARIF file and may be used by {% data variables.product.prodname_code_scanning %} to display URLs on {% data variables.product.prodname_dotcom %}.
name {% octicon "x" aria-label="Optional" %} The name of the rule. {% data variables.product.prodname_code_scanning_caps %} displays the name to allow results to be filtered by rule on {% data variables.product.prodname_dotcom %}. Limited to 255 characters.
shortDescription.text {% octicon "check" aria-label="Required" %} A concise description of the rule. {% data variables.product.prodname_code_scanning_caps %} displays the short description on {% data variables.product.prodname_dotcom %} next to the associated results. Limited to 1024 characters.
fullDescription.text {% octicon "check" aria-label="Required" %} A description of the rule. {% data variables.product.prodname_code_scanning_caps %} displays the full description on {% data variables.product.prodname_dotcom %} next to the associated results. Limited to 1024 characters.
defaultConfiguration.level {% octicon "x" aria-label="Optional" %} Default severity level of the rule. {% data variables.product.prodname_code_scanning_caps %} uses severity levels to help you understand how critical the result is for a given rule. By default, the defaultConfiguration.level is set to warning. However, you can override the default level for a rule by setting the level attribute in the result object associated with the result. For more information, please refer to the documentation on the result object. The valid values for defaultConfiguration.level are: note, warning and error.
help.text {% octicon "check" aria-label="Required" %} Documentation for the rule using text format. {% data variables.product.prodname_code_scanning_caps %} displays this help documentation next to the associated results.
help.markdown {% octicon "x" aria-label="Optional" %} (Recommended) Documentation for the rule using Markdown format. {% data variables.product.prodname_code_scanning_caps %} displays this help documentation next to the associated results. When help.markdown is available, it is displayed instead of help.text.
properties.tags[] {% octicon "x" aria-label="Optional" %} An array of strings. {% data variables.product.prodname_code_scanning_caps %} uses tags to allow you to filter results on {% data variables.product.prodname_dotcom %}. For example, it is possible to filter to all results that have the tag security.
properties.precision {% octicon "x" aria-label="Optional" %} (Recommended) A string that indicates how often the results indicated by this rule are true. For example, if a rule has a known high false-positive rate, the precision should be low. {% data variables.product.prodname_code_scanning_caps %} orders results by precision on {% data variables.product.prodname_dotcom %} so that the results with the highest level, and highest precision are shown first. Can be one of: very-high, high, medium, or low.
properties.problem.severity {% octicon "x" aria-label="Optional" %} (Recommended) A string that indicates the level of severity of any alerts generated by a non-security query. This, with the properties.precision property, determines whether the results are displayed by default on {% data variables.product.prodname_dotcom %} so that the results with the highest problem.severity, and highest precision are shown first. Can be one of: error, warning, or recommendation.
properties.security-severity {% octicon "x" aria-label="Optional" %} (Recommended only for security rules) If you include a value for this field, results for the rule are treated as security results. A string representing a score that indicates the level of severity, a value that is greater than 0.0 up to 10.0, for security queries (@tags includes security). This, with the properties.precision property, determines whether the results are displayed by default on {% data variables.product.prodname_dotcom %} so that the results with the highest security-severity, and highest precision are shown first. {% data variables.product.prodname_code_scanning_caps %} translates numerical scores as follows: over 9.0 is critical, from 7.0 to 8.9 is high, from 4.0 to 6.9 is medium and from 0.1 to 3.9 is low. A value of 0.0 or any other value outside the given range is regarded as having no security severity.

result object

Each result object contains details for one alert in the codebase. Within the results object, you can reference the rule that detected the alert. For more information, see "Understanding rules and results" above.

{% data reusables.code-scanning.upload-sarif-alert-limit %}

Name Required Description
ruleId {% octicon "x" aria-label="Optional" %} The unique identifier of the rule (reportingDescriptor.id). For more information, see the reportingDescriptor object. {% data variables.product.prodname_code_scanning_caps %} uses the rule identifier to filter results by rule on {% data variables.product.prodname_dotcom %}.
ruleIndex {% octicon "x" aria-label="Optional" %} The index of the associated rule (reportingDescriptor object) in the tool component rules array. For more information, see the run object. The allowed range for this property 0 to 2^63 - 1.
rule {% octicon "x" aria-label="Optional" %} A reference used to locate the rule (reporting descriptor) for this result. For more information, see the reportingDescriptor object.
level {% octicon "x" aria-label="Optional" %} The severity of the result. This level overrides the default severity defined by the rule. {% data variables.product.prodname_code_scanning_caps %} uses the level to filter results by severity on {% data variables.product.prodname_dotcom %}.
message.text {% octicon "check" aria-label="Required" %} A message that describes the result. {% data variables.product.prodname_code_scanning_caps %} displays the message text as the title of the result. Only the first sentence of the message will be displayed when visible space is limited.
locations[] {% octicon "check" aria-label="Required" %} The set of locations where the result was detected up to a maximum of 10. Only one location should be included unless the problem can only be corrected by making a change at every specified location. Note: At least one location is required for {% data variables.product.prodname_code_scanning %} to display a result. {% data variables.product.prodname_code_scanning_caps %} will use this property to decide which file to annotate with the result. Only the first value of this array is used. All other values are ignored.
partialFingerprints {% octicon "check" aria-label="Required" %} A set of strings used to track the unique identity of the result. {% data variables.product.prodname_code_scanning_caps %} uses partialFingerprints to accurately identify which results are the same across commits and branches. {% data variables.product.prodname_code_scanning_caps %} will attempt to use partialFingerprints if they exist. If you are uploading third-party SARIF files with the upload-action, the action will create partialFingerprints for you when they are not included in the SARIF file. For more information, see "Providing data to track code scanning alerts across runs." Note: {% data variables.product.prodname_code_scanning_caps %} only uses the primaryLocationLineHash.
codeFlows[].threadFlows[].locations[] {% octicon "x" aria-label="Optional" %} An array of location objects for a threadFlow object, which describes the progress of a program through a thread of execution. A codeFlow object describes a pattern of code execution used to detect a result. If code flows are provided, {% data variables.product.prodname_code_scanning %} will expand code flows on {% data variables.product.prodname_dotcom %} for the relevant result. For more information, see the location object.
relatedLocations[] {% octicon "x" aria-label="Optional" %} A set of locations relevant to this result. {% data variables.product.prodname_code_scanning_caps %} will link to related locations when they are embedded in the result message. For more information, see the location object.

location object

A location within a programming artifact, such as a file in the repository or a file that was generated during a build.

Name Required Description
location.id {% octicon "x" aria-label="Optional" %} A unique identifier that distinguishes this location from all other locations within a single result object. The allowed range for this property 0 to 2^63 - 1.
location.physicalLocation {% octicon "check" aria-label="Required" %} Identifies the artifact and region. For more information, see the physicalLocation.
location.message.text {% octicon "x" aria-label="Optional" %} A message relevant to the location.

physicalLocation object

Name Required Description
artifactLocation.uri {% octicon "check" aria-label="Required" %} A URI indicating the location of an artifact, usually a file either in the repository or generated during a build. For the best results we recommend that this is a relative path from the root of the GitHub repository being analyzed. For example, src/main.js. For more information about artifact URIs, see "Specifying the root for source files."
region.startLine {% octicon "check" aria-label="Required" %} The line number of the first character in the region.
region.startColumn {% octicon "check" aria-label="Required" %} The column number of the first character in the region.
region.endLine {% octicon "check" aria-label="Required" %} The line number of the last character in the region.
region.endColumn {% octicon "check" aria-label="Required" %} The column number of the character following the end of the region.

runAutomationDetails object

The runAutomationDetails object contains information that specifies the identity of a run.

Name Required Description
id {% octicon "x" aria-label="Optional" %} A string that identifies the category of the analysis and the run ID. Use if you want to upload multiple SARIF files for the same tool and commit, but performed on different languages or different parts of the code.

The use of the runAutomationDetails object is optional.

The id field can include an analysis category and a run ID. We don't use the run ID part of the id field, but we store it.

Use the category to distinguish between multiple analyses for the same tool or commit, but performed on different languages or different parts of the code. Use the run ID to identify the specific run of the analysis, such as the date the analysis was run.

id is interpreted as category/run-id. If the id contains no forward slash (/), then the entire string is the run_id and the category is empty. Otherwise, category is everything in the string until the last forward slash, and run_id is everything after.

id category run_id
my-analysis/tool1/2021-02-01 my-analysis/tool1 2021-02-01
my-analysis/tool1/ my-analysis/tool1 None
my-analysis for tool1 None my-analysis for tool1
  • The run with an id of "my-analysis/tool1/2021-02-01" belongs to the category "my-analysis/tool1". Presumably, this is the run from February 2, 2021.
  • The run with an id of "my-analysis/tool1/" belongs to the category "my-analysis/tool1" but is not distinguished from other runs in that category.
  • The run whose id is "my-analysis for tool1 " has a unique identifier but cannot be inferred to belong to any category.

For more information about the runAutomationDetails object and the id field, see runAutomationDetails object in the OASIS documentation.

Note that the rest of the supported fields are ignored.

SARIF output file examples

These example SARIF output files show supported properties and example values.

Example with minimum required properties

This SARIF output file has example values to show the minimum required properties for {% data variables.product.prodname_code_scanning %} results to work as expected. If you remove any properties, omit values, or use an empty string, this data will not be displayed correctly or sync on {% data variables.product.prodname_dotcom %}.

{
  "$schema": "https://json.schemastore.org/sarif-2.1.0.json",
  "version": "2.1.0",
  "runs": [
    {
      "tool": {
        "driver": {
          "name": "Tool Name",
          "rules": [
            {
              "id": "R01"
                      ...
              "properties" : {
                 "id" : "java/unsafe-deserialization",
                 "kind" : "path-problem",
                 "name" : "...",
                 "problem.severity" : "error",
                 "security-severity" : "9.8",
               }
            }
          ]
        }
      },
      "results": [
        {
          "ruleId": "R01",
          "message": {
            "text": "Result text. This result does not have a rule associated."
          },
          "locations": [
            {
              "physicalLocation": {
                "artifactLocation": {
                  "uri": "fileURI"
                },
                "region": {
                  "startLine": 2,
                  "startColumn": 7,
                  "endColumn": 10
                }
              }
            }
          ],
          "partialFingerprints": {
            "primaryLocationLineHash": "39fa2ee980eb94b0:1"
          }
        }
      ]
    }
  ]
}

Example showing all supported SARIF properties

This SARIF output file has example values to show all supported SARIF properties for {% data variables.product.prodname_code_scanning %}.

{
  "$schema": "https://json.schemastore.org/sarif-2.1.0.json",
  "version": "2.1.0",
  "runs": [
    {
      "tool": {
        "driver": {
          "name": "Tool Name",
          "semanticVersion": "2.0.0",
          "rules": [
            {
              "id": "3f292041e51d22005ce48f39df3585d44ce1b0ad",
              "name": "js/unused-local-variable",
              "shortDescription": {
                "text": "Unused variable, import, function or class"
              },
              "fullDescription": {
                "text": "Unused variables, imports, functions or classes may be a symptom of a bug and should be examined carefully."
              },
              "defaultConfiguration": {
                "level": "note"
              },
              "properties": {
                "tags": [
                  "maintainability"
                ],
                "precision": "very-high"
              }
            },
            {
              "id": "d5b664aefd5ca4b21b52fdc1d744d7d6ab6886d0",
              "name": "js/inconsistent-use-of-new",
              "shortDescription": {
                "text": "Inconsistent use of 'new'"
              },
              "fullDescription": {
                "text": "If a function is intended to be a constructor, it should always be invoked with 'new'. Otherwise, it should always be invoked as a normal function, that is, without 'new'."
              },
              "properties": {
                "tags": [
                  "reliability",
                  "correctness",
                  "language-features"
                ],
                "precision": "very-high"
              }
            },
            {
              "id": "R01"
            }
          ]
        }
      },
      "automationDetails": {
        "id": "my-category/"
      },
      "results": [
        {
          "ruleId": "3f292041e51d22005ce48f39df3585d44ce1b0ad",
          "ruleIndex": 0,
          "message": {
            "text": "Unused variable foo."
          },
          "locations": [
            {
              "physicalLocation": {
                "artifactLocation": {
                  "uri": "main.js",
                  "uriBaseId": "%SRCROOT%"
                },
                "region": {
                  "startLine": 2,
                  "startColumn": 7,
                  "endColumn": 10
                }
              }
            }
          ],
          "partialFingerprints": {
            "primaryLocationLineHash": "39fa2ee980eb94b0:1",
            "primaryLocationStartColumnFingerprint": "4"
          }
        },
        {
          "ruleId": "d5b664aefd5ca4b21b52fdc1d744d7d6ab6886d0",
          "ruleIndex": 1,
          "message": {
            "text": "Function resolvingPromise is sometimes invoked as a constructor (for example [here](1)), and sometimes as a normal function (for example [here](2))."
          },
          "locations": [
            {
              "physicalLocation": {
                "artifactLocation": {
                  "uri": "src/promises.js",
                  "uriBaseId": "%SRCROOT%"
                },
                "region": {
                  "startLine": 2
                }
              }
            }
          ],
          "partialFingerprints": {
            "primaryLocationLineHash": "5061c3315a741b7d:1",
            "primaryLocationStartColumnFingerprint": "7"
          },
          "relatedLocations": [
            {
              "id": 1,
              "physicalLocation": {
                "artifactLocation": {
                  "uri": "src/ParseObject.js",
                  "uriBaseId": "%SRCROOT%"
                },
                "region": {
                  "startLine": 2281,
                  "startColumn": 33,
                  "endColumn": 55
                }
              },
              "message": {
                "text": "here"
              }
            },
            {
              "id": 2,
              "physicalLocation": {
                "artifactLocation": {
                  "uri": "src/LiveQueryClient.js",
                  "uriBaseId": "%SRCROOT%"
                },
                "region": {
                  "startLine": 166
                }
              },
              "message": {
                "text": "here"
              }
            }
          ]
        },
        {
          "ruleId": "R01",
          "message": {
            "text": "Specifying both [ruleIndex](1) and [ruleID](2) might lead to inconsistencies."
          },
          "level": "error",
          "locations": [
            {
              "physicalLocation": {
                "artifactLocation": {
                  "uri": "full.sarif",
                  "uriBaseId": "%SRCROOT%"
                },
                "region": {
                  "startLine": 54,
                  "startColumn": 10,
                  "endLine": 55,
                  "endColumn": 25
                }
              }
            }
          ],
          "relatedLocations": [
            {
              "id": 1,
              "physicalLocation": {
                "artifactLocation": {
                  "uri": "full.sarif"
                },
                "region": {
                  "startLine": 81,
                  "startColumn": 10,
                  "endColumn": 18
                }
              },
              "message": {
                "text": "here"
              }
            },
            {
              "id": 2,
              "physicalLocation": {
                "artifactLocation": {
                  "uri": "full.sarif"
                },
                "region": {
                  "startLine": 82,
                  "startColumn": 10,
                  "endColumn": 21
                }
              },
              "message": {
                "text": "here"
              }
            }
          ],
          "codeFlows": [
            {
              "threadFlows": [
                {
                  "locations": [
                    {
                      "location": {
                        "physicalLocation": {
                          "region": {
                            "startLine": 11,
                            "endLine": 29,
                            "startColumn": 10,
                            "endColumn": 18
                          },
                          "artifactLocation": {
                            "uriBaseId": "%SRCROOT%",
                            "uri": "full.sarif"
                          }
                        },
                        "message": {
                          "text": "Rule has index 0"
                        }
                      }
                    },
                    {
                      "location": {
                        "physicalLocation": {
                          "region": {
                            "endColumn": 47,
                            "startColumn": 12,
                            "startLine": 12
                          },
                          "artifactLocation": {
                            "uriBaseId": "%SRCROOT%",
                            "uri": "full.sarif"
                          }
                        }
                      }
                    }
                  ]
                }
              ]
            }
          ],
          "partialFingerprints": {
            "primaryLocationLineHash": "ABC:2"
          }
        }
      ],
      "columnKind": "utf16CodeUnits"
    }
  ]
}