mirror of
https://github.com/github/codeql.git
synced 2026-03-22 15:36:48 +01:00
JS: review fixups in documentation and comments
This commit is contained in:
@@ -1,11 +1,11 @@
|
||||
/**
|
||||
* @name Clear text logging of sensitive information
|
||||
* @description Sensitive information logged without encryption or hashing can expose it to an
|
||||
* attacker.
|
||||
* @name Clear-text logging of sensitive information
|
||||
* @description Logging sensitive information without encryption or hashing can
|
||||
* expose it to an attacker.
|
||||
* @kind problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/cleartext-logging
|
||||
* @id js/clear-text-logging
|
||||
* @tags security
|
||||
* external/cwe/cwe-312
|
||||
* external/cwe/cwe-315
|
||||
|
||||
@@ -15,7 +15,7 @@ which are stored on the machine of the end-user.
|
||||
<p>
|
||||
Ensure that sensitive information is always encrypted before being stored.
|
||||
If possible, avoid placing sensitive information in cookies altogether.
|
||||
Instead, prefer storing, in the cookie, a key that can be used to lookup the
|
||||
Instead, prefer storing, in the cookie, a key that can be used to look up the
|
||||
sensitive information.
|
||||
</p>
|
||||
<p>
|
||||
|
||||
Reference in New Issue
Block a user