From d33202dee9e42272eef1d8d569bcb9db6023d7b4 Mon Sep 17 00:00:00 2001 From: Michael Hohn Date: Thu, 10 Jul 2025 13:11:22 -0700 Subject: [PATCH] wip: README cleanup --- codeql-sqlite/README.org | 10 ---------- 1 file changed, 10 deletions(-) diff --git a/codeql-sqlite/README.org b/codeql-sqlite/README.org index 4fcecd0..76e836b 100644 --- a/codeql-sqlite/README.org +++ b/codeql-sqlite/README.org @@ -134,16 +134,6 @@ 19: - ["java.io", "Console", False, "readLine", "(String,Object[])", "", "Argument[this]", "ReturnValue", "taint", "df-generated"] #+END_SRC - - - - [ ] checkkn - - - [ ] Also check RemoteFlowSource, from - : import semmle.code.cpp.security.FlowSources - - The goal now is to supplement sources via the model editor. - - * SQL injection example This directory contains the problematic Java source code. The rest of this README describes