|
2 | 2 |
|
3 | 3 | ## General improvements |
4 | 4 |
|
| 5 | +* TypeScript 3.8 is now supported. |
| 6 | + |
5 | 7 | * Alert suppression can now be done with single-line block comments (`/* ... */`) as well as line comments (`// ...`). |
6 | 8 |
|
7 | 9 | * Imports with the `.js` extension can now be resolved to a TypeScript file, |
8 | 10 | when the import refers to a file generated by TypeScript. |
9 | 11 |
|
10 | 12 | * Imports that rely on path-mappings from a `tsconfig.json` file can now be resolved. |
11 | 13 |
|
| 14 | +* Export declarations of the form `export * as ns from "x"` are now analyzed more precisely. |
| 15 | + |
12 | 16 | * The analysis of sanitizer guards has improved, leading to fewer false-positive results from the security queries. |
13 | 17 |
|
| 18 | +* The call graph construction has been improved, leading to more results from the security queries: |
| 19 | + - Calls can now be resolved to indirectly-defined class members in more cases. |
| 20 | + - Calls through partial invocations such as `.bind` can now be resolved in more cases. |
| 21 | + |
14 | 22 | * Support for the following frameworks and libraries has been improved: |
15 | | - - [react](https://www.npmjs.com/package/react) |
16 | | - - [typeahead.js](https://www.npmjs.com/package/typeahead.js) |
17 | | - - [Handlebars](https://www.npmjs.com/package/handlebars) |
18 | 23 | - [Electron](https://electronjs.org/) |
| 24 | + - [Handlebars](https://www.npmjs.com/package/handlebars) |
| 25 | + - [Koa](https://www.npmjs.com/package/koa) |
19 | 26 | - [Node.js](https://nodejs.org/) |
20 | 27 | - [Socket.IO](https://socket.io/) |
21 | | - - [ws](https://github.com/websockets/ws) |
22 | 28 | - [WebSocket](https://developer.mozilla.org/en-US/docs/Web/API/WebSockets_API) |
23 | | - - [Koa](https://www.npmjs.com/package/koa) |
| 29 | + - [chrome-remote-interface](https://www.npmjs.com/package/chrome-remote-interface) |
| 30 | + - [for-in](https://www.npmjs.com/package/for-in) |
| 31 | + - [for-own](https://www.npmjs.com/package/for-own) |
| 32 | + - [http2](https://nodejs.org/api/http2.html) |
| 33 | + - [lazy-cache](https://www.npmjs.com/package/lazy-cache) |
| 34 | + - [react](https://www.npmjs.com/package/react) |
| 35 | + - [request](https://www.npmjs.com/package/request) |
| 36 | + - [send](https://www.npmjs.com/package/send) |
| 37 | + - [typeahead.js](https://www.npmjs.com/package/typeahead.js) |
| 38 | + - [ws](https://github.com/websockets/ws) |
24 | 39 |
|
25 | 40 | ## New queries |
26 | 41 |
|
|
29 | 44 | | Cross-site scripting through exception (`js/xss-through-exception`) | security, external/cwe/cwe-079, external/cwe/cwe-116 | Highlights potential XSS vulnerabilities where an exception is written to the DOM. Results are not shown on LGTM by default. | |
30 | 45 | | Regular expression always matches (`js/regex/always-matches`) | correctness, regular-expressions | Highlights regular expression checks that trivially succeed by matching an empty substring. Results are shown on LGTM by default. | |
31 | 46 | | Missing await (`js/missing-await`) | correctness | Highlights expressions that operate directly on a promise object in a nonsensical way, instead of awaiting its result. Results are shown on LGTM by default. | |
32 | | -| Prototype pollution in utility function (`js/prototype-pollution-utility`) | security, external/cwe/cwe-400, external/cwe/cwe-471 | Highlights recursive copying operations that are susceptible to prototype pollution. Results are shown on LGTM by default. | |
| 47 | +| Polynomial regular expression used on uncontrolled data (`js/polynomial-redos`) | security, external/cwe/cwe-730, external/cwe/cwe-400 | Highlights expensive regular expressions that may be used on malicious input. Results are shown on LGTM by default. | |
| 48 | +| Prototype pollution in utility function (`js/prototype-pollution-utility`) | security, external/cwe/cwe-400, external/cwe/cwe-471 | Highlights recursive assignment operations that are susceptible to prototype pollution. Results are shown on LGTM by default. | |
| 49 | +| Unsafe jQuery plugin (`js/unsafe-jquery-plugin`) | Highlights potential XSS vulnerabilities in unsafely designed jQuery plugins. Results are shown on LGTM by default. | |
| 50 | +| Unnecessary use of `cat` process (`js/unnecessary-use-of-cat`) | correctness, security, maintainability | Highlights command executions of `cat` where the fs API should be used instead. Results are shown on LGTM by default. | |
| 51 | + |
33 | 52 |
|
34 | 53 | ## Changes to existing queries |
35 | 54 |
|
|
42 | 61 | | Expression has no effect (`js/useless-expression`) | Fewer false positive results | The query now recognizes block-level flow type annotations and ignores the first statement of a try block. | |
43 | 62 | | Use of call stack introspection in strict mode (`js/strict-mode-call-stack-introspection`) | Fewer false positive results | The query no longer flags expression statements. | |
44 | 63 | | Missing CSRF middleware (`js/missing-token-validation`) | Fewer false positive results | The query reports fewer duplicates and only flags handlers that explicitly access cookie data. | |
| 64 | +| Uncontrolled data used in path expression (`js/path-injection`) | More results | This query now recognizes additional ways dangerous paths can be constructed and used. | |
| 65 | +| Uncontrolled command line (`js/command-line-injection`) | More results | This query now recognizes additional ways of constructing arguments to `cmd.exe` and `/bin/sh`. | |
| 66 | +| Syntax error (`js/syntax-error`) | Lower severity | This results of this query are now displayed with lower severity. | |
45 | 67 |
|
46 | 68 | ## Changes to libraries |
47 | 69 |
|
|
0 commit comments