Java: Update all test util paths to point to the new location.

This commit is contained in:
Michael Nebel
2024-11-12 16:38:21 +01:00
parent 91cfb30513
commit 0a1d2d0bbb
226 changed files with 226 additions and 226 deletions

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.TaintTracking
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
private import semmle.code.java.dataflow.ExternalFlow
module Config implements DataFlow::ConfigSig {

View File

@@ -1,3 +1,3 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-020/Log4jJndiInjection.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,5 +1,5 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import semmle.code.java.security.TaintedPathQuery
import TaintFlowTestArgString<TaintedPathConfig, getArgString/2>

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-073/FilePathInjection.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-078/CommandInjectionRuntimeExecLocal.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-078/ExecTainted.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-089/MyBatisAnnotationSqlInjection.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-089/MyBatisMapperXmlSqlInjection.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-094/BeanShellInjection.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-094/JShellInjection.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-094/JakartaExpressionInjection.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-094/JythonInjection.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-094/ScriptInjection.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-1004/SensitiveCookieNotHttpOnly.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-200/InsecureWebResourceResponse.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-200/SensitiveAndroidFileLeak.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-208/PossibleTimingAttackAgainstSignature.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-208/TimingAttackAgainstSignature.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-299/DisabledRevocationChecking.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-327/UnsafeTlsVersion.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-346/UnvalidatedCors.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-347/Auth0NoVerifier.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-348/ClientSuppliedIpUsedInSecurityCheck.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-352/JsonpInjection.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-400/LocalThreadResourceAbuse.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-400/ThreadResourceAbuse.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-470/LoadClassNoSignatureCheck.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-470/UnsafeReflection.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-502/UnsafeDeserializationRmi.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,6 +1,6 @@
import java
import experimental.semmle.code.java.security.DecompressionBombQuery
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import TaintFlowTestArgString<DecompressionBombsConfig, getArgString/2>
string getArgString(DataFlow::Node src, DataFlow::Node sink) {

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-598/SensitiveGetQuery.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-600/UncaughtServletException.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-601/SpringUrlRedirect.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-625/PermissiveDotRegex.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-652/XQueryInjection.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-755/NFEAndroidDoS.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,2 +1,2 @@
query: experimental/Security/CWE/CWE-759/HashWithoutSalt.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.DataFlow
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
module Config implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node n) { n.asExpr().(MethodCall).getMethod().hasName("source") }

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,3 +1,3 @@
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,5 +1,5 @@
import java
import semmle.code.java.dataflow.DataFlow
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.FlowSources
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
class TestRemoteFlowSource extends RemoteFlowSource {
TestRemoteFlowSource() { this.asParameter().hasName("source") }

View File

@@ -1,5 +1,5 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
module FieldValueConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) { source instanceof DataFlow::FieldValueNode }

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.DataFlow
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
module Base {
predicate isSource(DataFlow::Node n) { n.asExpr().(MethodCall).getMethod().hasName("source") }

View File

@@ -1,7 +1,7 @@
import java
import semmle.code.java.dataflow.DataFlow
import semmle.code.java.dataflow.FlowSteps
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,5 +1,5 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
module TestConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) { DefaultFlowConfig::isSource(source) }

View File

@@ -5,7 +5,7 @@
import java
import semmle.code.java.dataflow.RangeAnalysis
private import TestUtilities.InlineExpectationsTest as IET
private import utils.test.InlineExpectationsTest as IET
module RangeTest implements IET::TestSig {
string getARelevantTag() { result = "bound" }

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.TaintTracking
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
import DataFlow
predicate src(Node n, string s) {

View File

@@ -1,3 +1,3 @@
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,3 +1,3 @@
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,3 +1,3 @@
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.ExternalFlow
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import ModelValidation
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.FlowSources
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
predicate isTestSink(DataFlow::Node n) {
exists(MethodCall ma | ma.getMethod().hasName("sink") | n.asExpr() = ma.getAnArgument())

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.FlowSources
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
predicate isTestSink(DataFlow::Node n) {
exists(MethodCall ma | ma.getMethod().hasName("sink") | n.asExpr() = ma.getAnArgument())

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.FlowSources
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
predicate isTestSink(DataFlow::Node n) {
exists(MethodCall ma | ma.getMethod().hasName("sink") | n.asExpr() = ma.getAnArgument())

View File

@@ -1,3 +1,3 @@
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,7 +1,7 @@
import java
import semmle.code.java.frameworks.JaxWS
import semmle.code.java.security.XSS
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
module JaxRsTest implements TestSig {
string getARelevantTag() {

View File

@@ -1,7 +1,7 @@
import java
import semmle.code.java.dataflow.TaintTracking
import semmle.code.java.dataflow.FlowSources
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
module Config implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node node) {

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.frameworks.JaxWS
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
module JaxWsEndpointTest implements TestSig {
string getARelevantTag() { result = ["JaxWsEndpoint", "JaxWsEndpointRemoteMethod"] }

View File

@@ -1,2 +1,2 @@
query: Security/CWE/CWE-601/UrlRedirect.ql
postprocess: TestUtilities/PrettyPrintModels.ql
postprocess: utils/test/PrettyPrintModels.ql

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.FlowSources
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
module ProviderTaintFlowConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node n) { n instanceof ActiveThreatModelSource }

View File

@@ -1,7 +1,7 @@
import java
import semmle.code.java.dataflow.DataFlow
import semmle.code.java.dataflow.FlowSources
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
module Config implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node src) { src instanceof ActiveThreatModelSource }

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,5 +1,5 @@
import java
import semmle.code.java.frameworks.android.Intent
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.TaintTracking
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import semmle.code.java.dataflow.FlowSources
module SliceValueFlowConfig implements DataFlow::ConfigSig {

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.FlowSources
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
module SourceValueFlowConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node src) { src instanceof ActiveThreatModelSource }

View File

@@ -2,7 +2,7 @@ import semmle.code.java.dataflow.DataFlow
import semmle.code.java.dataflow.TaintTracking
import semmle.code.java.dataflow.FlowSources
import semmle.code.java.security.QueryInjection
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
module Config implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) {

View File

@@ -2,7 +2,7 @@ import semmle.code.java.dataflow.DataFlow
import semmle.code.java.dataflow.TaintTracking
import semmle.code.java.dataflow.FlowSources
import semmle.code.java.security.QueryInjection
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
module Config implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) {

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.FlowSources
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -3,7 +3,7 @@ import semmle.code.java.dataflow.TaintTracking
import semmle.code.java.dataflow.FlowSources
import semmle.code.java.security.XSS
import semmle.code.java.security.UrlRedirect
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
module Config implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node n) {

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.TaintTracking
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
module TaintFlowConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node n) { n.asExpr().(MethodCall).getMethod().hasName("taint") }

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.FlowSources
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
module TestConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) { source instanceof ActiveThreatModelSource }

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.FlowSources
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
module JmsRemoteSourcesTest implements TestSig {
string getARelevantTag() { result = "source" }

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

View File

@@ -1,6 +1,6 @@
import java
import semmle.code.java.dataflow.FlowSources
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
module Config implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node n) { n instanceof RemoteFlowSource }

View File

@@ -1,4 +1,4 @@
import java
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest
import TaintFlow::PathGraph

Some files were not shown because too many files have changed in this diff Show More