Skip to content

Commit 2ac2233

Browse files
Mark Shannonmarkshannon
authored andcommitted
Add change note for enhance visibility of security alerts and conversion to path-queries.
1 parent 24bf292 commit 2ac2233

File tree

1 file changed

+38
-0
lines changed

1 file changed

+38
-0
lines changed
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
# Improvements to Python analysis
2+
3+
4+
## General improvements
5+
6+
> Changes that affect alerts in many files or from many queries
7+
> For example, changes to file classification
8+
9+
## New queries
10+
11+
| **Query** | **Tags** | **Purpose** |
12+
|-----------------------------|-----------|--------------------------------------------------------------------|
13+
| *@name of query (Query ID)* | *Tags* |*Aim of the new query and whether it is enabled by default or not* |
14+
15+
## Changes to existing queries
16+
17+
All taint-tracking queries now support visualization of paths in QL for Eclipse.
18+
Most security alerts are now visible on LGTM by default.
19+
20+
| **Query** | **Expected impact** | **Change** |
21+
|----------------------------|------------------------|------------------------------------------------------------------|
22+
| Code injection (`py/code-injection`) | Supports path visualization and is now visible on LGTM by default | No change to expected results |
23+
| Deserializing untrusted input (`py/unsafe-deserialization`) | Supports path visualization | No change to expected results |
24+
| Information exposure through an exception (`py/stack-trace-exposure`) | Now visible on LGTM by default | No change to expected results |
25+
| Reflected server-side cross-site scripting (`py/reflective-xss`) | Supports path visualization and is now visible on LGTM by default | No change to expected results |
26+
| SQL query built from user-controlled sources (`py/sql-injection`) | Supports path visualization and is now visible on LGTM by default | No change to expected results |
27+
| Uncontrolled data used in path expression (`py/path-injection`) | Supports path visualization and is now visible on LGTM by default | No change to expected results |
28+
| Uncontrolled command line (`py/command-line-injection`) | Supports path visualization and is now visible on LGTM by default | No change to expected results |
29+
| URL redirection from remote source (`py/url-redirection`) | Supports path visualization and is now visible on LGTM by default | No change to expected results |
30+
31+
## Changes to code extraction
32+
33+
* *Series of bullet points*
34+
35+
## Changes to QL libraries
36+
37+
* *Series of bullet points*
38+

0 commit comments

Comments
 (0)