File tree Expand file tree Collapse file tree 2 files changed +1
-7
lines changed
lib/codeql/swift/security
test/query-tests/Security/CWE-094 Expand file tree Collapse file tree 2 files changed +1
-7
lines changed Original file line number Diff line number Diff line change @@ -96,16 +96,11 @@ private class JSEvaluateScriptDefaultUnsafeJsEvalSink extends UnsafeJsEvalSink {
9696}
9797
9898/**
99- * A default SQL injection sanitrizer .
99+ * A default SQL injection sanitizer .
100100 */
101101private class DefaultUnsafeJsEvalAdditionalTaintStep extends UnsafeJsEvalAdditionalTaintStep {
102102 override predicate step ( DataFlow:: Node nodeFrom , DataFlow:: Node nodeTo ) {
103103 exists ( Argument arg |
104- arg =
105- any ( CallExpr ce |
106- ce .getStaticTarget ( ) .( MethodDecl ) .hasQualifiedName ( "String" , "init(decoding:as:)" )
107- ) .getArgument ( 0 )
108- or
109104 arg =
110105 any ( CallExpr ce |
111106 ce .getStaticTarget ( )
Original file line number Diff line number Diff line change 2727| UnsafeJsEval.swift:208:7:208:39 | ... .+(_:_:) ... : | UnsafeJsEval.swift:279:13:279:13 | string : |
2828| UnsafeJsEval.swift:208:7:208:39 | ... .+(_:_:) ... : | UnsafeJsEval.swift:285:13:285:13 | string : |
2929| UnsafeJsEval.swift:208:7:208:39 | ... .+(_:_:) ... : | UnsafeJsEval.swift:299:13:299:13 | string : |
30- | UnsafeJsEval.swift:211:19:211:41 | call to Data.init(_:) : | UnsafeJsEval.swift:214:7:214:49 | call to String.init(decoding:as:) : |
3130| UnsafeJsEval.swift:211:19:211:41 | call to Data.init(_:) : | UnsafeJsEval.swift:214:24:214:24 | remoteData : |
3231| UnsafeJsEval.swift:211:24:211:37 | .utf8 : | UnsafeJsEval.swift:144:5:144:29 | [summary param] 0 in Data.init(_:) : |
3332| UnsafeJsEval.swift:211:24:211:37 | .utf8 : | UnsafeJsEval.swift:211:19:211:41 | call to Data.init(_:) : |
You can’t perform that action at this time.
0 commit comments