From 58bbfe694f165955a6d59ecec011d7b3bdebd6e1 Mon Sep 17 00:00:00 2001 From: Michael Nebel Date: Wed, 1 May 2024 11:09:09 +0200 Subject: [PATCH] Java: Deprecate the content of ExecTaintedLocalQuery as this is unused. --- .../lib/semmle/code/java/security/ExecTaintedLocalQuery.qll | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/java/ql/lib/semmle/code/java/security/ExecTaintedLocalQuery.qll b/java/ql/lib/semmle/code/java/security/ExecTaintedLocalQuery.qll index ea36338fcb9..7a2d5b0947d 100644 --- a/java/ql/lib/semmle/code/java/security/ExecTaintedLocalQuery.qll +++ b/java/ql/lib/semmle/code/java/security/ExecTaintedLocalQuery.qll @@ -7,7 +7,7 @@ private import semmle.code.java.security.CommandArguments private import semmle.code.java.security.Sanitizers /** A taint-tracking configuration to reason about use of externally controlled strings to make command line commands. */ -module ExecTaintedLocalConfig implements DataFlow::ConfigSig { +deprecated module ExecTaintedLocalConfig implements DataFlow::ConfigSig { predicate isSource(DataFlow::Node src) { src instanceof LocalUserInput } predicate isSink(DataFlow::Node sink) { sink.asExpr() instanceof ArgumentToExec } @@ -20,6 +20,8 @@ module ExecTaintedLocalConfig implements DataFlow::ConfigSig { } /** + * DEPRCATED: Unused. + * * Taint-tracking flow for use of externally controlled strings to make command line commands. */ -module ExecTaintedLocalFlow = TaintTracking::Global; +deprecated module ExecTaintedLocalFlow = TaintTracking::Global;