diff --git a/ql/src/Security/CWE-295/DisabledCertificateCheck.ql b/ql/src/Security/CWE-295/DisabledCertificateCheck.ql
index 268a9a5bf09..7b4340818b1 100644
--- a/ql/src/Security/CWE-295/DisabledCertificateCheck.ql
+++ b/ql/src/Security/CWE-295/DisabledCertificateCheck.ql
@@ -8,7 +8,9 @@
* @id go/disabled-certificate-check
* @tags security
* external/cwe/cwe-295
- *
+ */
+
+/*
* The approach taken by this query is to look for assignments that set `InsecureSkipVerify`
* (from struct `Config` of package `crypto/tls`) to `true`. We exclude assignments that are
* guarded by a feature-flag selecting whether verification should be skipped or not, since
diff --git a/ql/src/experimental/IntegerOverflow/IntegerOverflow.qhelp b/ql/src/experimental/IntegerOverflow/IntegerOverflow.qhelp
index 3f0d10e111a..88dfc682d7c 100644
--- a/ql/src/experimental/IntegerOverflow/IntegerOverflow.qhelp
+++ b/ql/src/experimental/IntegerOverflow/IntegerOverflow.qhelp
@@ -1,23 +1,31 @@
+ Arithmetic calculations involving integers should be checked to ensure that overflow or
+ underflow cannot occur, as this may cause incorrect results or program crashes.
+
Before performing an integer operation that may cause an overflow, check the operands to ensure
that the result of the operation will fit into the value range of the type. Alternatively, check
the result of the operation to see whether it overflowed.
- start + offset may overflow if
- either start or offset is very large, which will cause the indexing
- operation to panic at runtime:
- start + offset overflows:
-
+ In the following example snippet, the addition start + offset may overflow if
+ either start or offset is very large, which will cause the indexing
+ operation to panic at runtime:
+
+ One way to prevent this is to check whether start + offset overflows:
+