mirror of
https://github.com/github/codeql.git
synced 2026-03-04 22:56:47 +01:00
Update java/ql/lib/semmle/code/java/security/UnsafeDeserializationQuery.qll
This commit is contained in:
@@ -29,7 +29,7 @@ private class ObjectInputStreamReadObjectMethod extends Method {
|
||||
}
|
||||
|
||||
/**
|
||||
* A type coming from `ObjectInputStream` that makes it safe to deserialize untrusted data.
|
||||
* A type extending `ObjectInputStream` that makes it safe to deserialize untrusted data.
|
||||
*
|
||||
* * See https://commons.apache.org/proper/commons-io/javadocs/api-2.5/org/apache/commons/io/serialization/ValidatingObjectInputStream.html
|
||||
* * See https://github.com/ikkisoft/SerialKiller
|
||||
|
||||
Reference in New Issue
Block a user