From 1a702976626894568328928a4f482b4e94016f75 Mon Sep 17 00:00:00 2001 From: Arthur Baars Date: Fri, 10 Mar 2023 12:52:41 +0100 Subject: [PATCH] JS: fix NPE --- .../extractor/src/com/semmle/js/extractor/AutoBuild.java | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/javascript/extractor/src/com/semmle/js/extractor/AutoBuild.java b/javascript/extractor/src/com/semmle/js/extractor/AutoBuild.java index 59f9d28fe58..ccde9f79320 100644 --- a/javascript/extractor/src/com/semmle/js/extractor/AutoBuild.java +++ b/javascript/extractor/src/com/semmle/js/extractor/AutoBuild.java @@ -1234,7 +1234,8 @@ protected DependencyInstallationResult preparePackagesAndDependencies(Set ParseResultInfo loc = extractor.extract(f, state); if (!extractor.getConfig().isExterns() && (loc == null || loc.getLinesOfCode() != 0)) seenCode = true; if (!extractor.getConfig().isExterns()) seenFiles = true; - for (ParseError err : loc.getParseErrors()) { + List errors = loc == null ? Collections.emptyList() : loc.getParseErrors(); + for (ParseError err : errors) { String msg = "A parse error occurred: " + StringUtil.escapeMarkdown(err.getMessage()) + ". Check the syntax of the file. If the file is invalid, correct the error or [exclude](https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/customizing-code-scanning) the file from analysis."; // file, relative to the source root