update query id to the updated id

This commit is contained in:
Erik Krogh Kristensen
2022-05-25 10:55:33 +02:00
committed by GitHub
parent 673355df65
commit 009ba4c280
2 changed files with 2 additions and 2 deletions

View File

@@ -2,7 +2,7 @@
### New Queries ### New Queries
* The `js/actions/injection` query has been added. It highlights GitHub Actions workflows that may allow an * The `js/actions/command-injection` query has been added. It highlights GitHub Actions workflows that may allow an
attacker to execute arbitrary code in the workflow. attacker to execute arbitrary code in the workflow.
The query previously existed an experimental query. The query previously existed an experimental query.
* A new query `js/insecure-temporary-file` has been added. The query detects the creation of temporary files that may be accessible by others users. The query is not run by default. * A new query `js/insecure-temporary-file` has been added. The query detects the creation of temporary files that may be accessible by others users. The query is not run by default.

View File

@@ -2,7 +2,7 @@
### New Queries ### New Queries
* The `js/actions/injection` query has been added. It highlights GitHub Actions workflows that may allow an * The `js/actions/command-injection` query has been added. It highlights GitHub Actions workflows that may allow an
attacker to execute arbitrary code in the workflow. attacker to execute arbitrary code in the workflow.
The query previously existed an experimental query. The query previously existed an experimental query.
* A new query `js/insecure-temporary-file` has been added. The query detects the creation of temporary files that may be accessible by others users. The query is not run by default. * A new query `js/insecure-temporary-file` has been added. The query detects the creation of temporary files that may be accessible by others users. The query is not run by default.