mirror of
https://github.com/github/codeql.git
synced 2026-04-28 10:15:14 +02:00
JS: Reference specific section of cheat sheet
This commit is contained in:
@@ -133,6 +133,8 @@ System and Network
|
||||
- `PersistentWriteAccess <https://codeql.github.com/codeql-standard-libraries/javascript/semmle/javascript/Concepts.qll/type.Concepts$PersistentWriteAccess.html>`__ -- writing to persistent storage
|
||||
- `SystemCommandExecution <https://codeql.github.com/codeql-standard-libraries/javascript/semmle/javascript/Concepts.qll/type.Concepts$SystemCommandExecution.html>`__ -- execution of a system command
|
||||
|
||||
.. _data-flow-cheat-sheet-for-javascript--untrusted-data:
|
||||
|
||||
Untrusted Data
|
||||
--------------
|
||||
|
||||
|
||||
@@ -11,7 +11,7 @@ You can model potential sources of untrusted user input in your code without mak
|
||||
|
||||
Specifying remote flow sources in external files is currently in beta and subject to change.
|
||||
|
||||
As mentioned in the :doc:`Data flow cheat sheet for JavaScript <data-flow-cheat-sheet-for-javascript>`, the CodeQL libraries for JavaScript
|
||||
As mentioned in the :ref:`Data flow cheat sheet for JavaScript <data-flow-cheat-sheet-for-javascript--untrusted-data>`, the CodeQL libraries for JavaScript
|
||||
provide a class `RemoteFlowSource <https://codeql.github.com/codeql-standard-libraries/javascript/semmle/javascript/security/dataflow/RemoteFlowSources.qll/type.RemoteFlowSources$Cached$RemoteFlowSource.html>`__ to represent sources of untrusted user input, sometimes also referred to as remote flow
|
||||
sources.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user