mirror of
https://github.com/github/codeql.git
synced 2025-12-17 01:03:14 +01:00
Text updates for consistency
This commit is contained in:
@@ -4,18 +4,18 @@
|
|||||||
|
|
||||||
| **Query** | **Expected impact** | **Change** |
|
| **Query** | **Expected impact** | **Change** |
|
||||||
|------------------------------|------------------------|-----------------------------------|
|
|------------------------------|------------------------|-----------------------------------|
|
||||||
| Clear text storage of sensitive information (`cs/cleartext-storage-of-sensitive-information`) | More results | Data sources have been added from user controls in `System.Windows.Forms`. |
|
| Clear text storage of sensitive information (`cs/cleartext-storage-of-sensitive-information`) | More results | Now includes data sources for user controls in `System.Windows.Forms`. |
|
||||||
| Dereferenced variable is always null (`cs/dereferenced-value-is-always-null`) | Improved results | The query has been rewritten from scratch, and the analysis is now based on static single assignment (SSA) forms. Results are now shown by default in LGTM. |
|
| Dereferenced variable is always null (`cs/dereferenced-value-is-always-null`) | Improved results | The query has been rewritten from scratch, and the analysis is now based on static single assignment (SSA) forms. Results are now shown by default in LGTM. |
|
||||||
| Dereferenced variable may be null (`cs/dereferenced-value-may-be-null`) | Improved results | The query has been rewritten from scratch, and the analysis is now based on static single assignment (SSA) forms. Results are now shown by default in LGTM. |
|
| Dereferenced variable may be null (`cs/dereferenced-value-may-be-null`) | Improved results | The query has been rewritten from scratch, and the analysis is now based on static single assignment (SSA) forms. Results are now shown by default in LGTM. |
|
||||||
| Double-checked lock is not thread-safe (`cs/unsafe-double-checked-lock`) | Fewer false positive and more true positive results | No longer highlights code where the underlying field was not updated in the `lock` statement, or where the field is a `struct`. Results have been added where there are other statements inside the `lock` statement. |
|
| Double-checked lock is not thread-safe (`cs/unsafe-double-checked-lock`) | Fewer false positive and more true positive results | No longer highlights code where the underlying field was not updated in the `lock` statement, or where the field is a `struct`. Results have been added where there are other statements inside the `lock` statement. |
|
||||||
| Exposure of private information (`cs/exposure-of-sensitive-information`) | More results | Data sources have been added from user controls in `System.Windows.Forms`. |
|
| Exposure of private information (`cs/exposure-of-sensitive-information`) | More results | Now includes data sources for user controls in `System.Windows.Forms`. |
|
||||||
| Improper control of generation of code (`cs/code-injection`) | More results | Data sources have been added from user controls in `System.Windows.Forms`. |
|
| Improper control of generation of code (`cs/code-injection`) | More results | Now includes data sources for user controls in `System.Windows.Forms`. |
|
||||||
| Off-by-one comparison against container length (`cs/index-out-of-bounds`) | Fewer false positives | Results have been removed when there are additional guards on the index. |
|
| Off-by-one comparison against container length (`cs/index-out-of-bounds`) | Fewer false positive results | No longer reports results when there are additional guards on the index. |
|
||||||
| SQL query built from user-controlled sources (`cs/sql-injection`) | More results | Data sources have been added from user controls in `System.Windows.Forms`. |
|
| SQL query built from user-controlled sources (`cs/sql-injection`) | More results | Now includes data sources for user controls in `System.Windows.Forms`. |
|
||||||
| Uncontrolled format string (`cs/uncontrolled-format-string`) | More results | Data sources have been added from user controls in `System.Windows.Forms`. |
|
| Uncontrolled format string (`cs/uncontrolled-format-string`) | More results | Now includes data sources for user controls in `System.Windows.Forms`. |
|
||||||
| Unused format argument (`cs/format-argument-unused`) | Fewer false positives | Results have been removed where the format string is empty. This is often used as a default value and is not an interesting result. |
|
| Unused format argument (`cs/format-argument-unused`) | Fewer false positive results | No longer reports results where the format string is empty. This is often used as a default value and is not an interesting result. |
|
||||||
| Use of default ToString() (`cs/call-to-object-tostring`) | Fewer false positives | Results have been removed for `char` arrays passed to `StringBuilder.Append()`, which were incorrectly marked as using `ToString`. |
|
| Use of default ToString() (`cs/call-to-object-tostring`) | Fewer false positive results | No longer reports results for `char` arrays passed to `StringBuilder.Append()`, which were incorrectly marked as using `ToString`. |
|
||||||
| Use of default ToString() (`cs/call-to-object-tostring`) | Fewer results | Results have been removed when the object is an interface or an abstract class. |
|
| Use of default ToString() (`cs/call-to-object-tostring`) | Fewer results | No longer reports results when the object is an interface or an abstract class. |
|
||||||
| Using a package with a known vulnerability (`cs/use-of-vulnerable-package`) | More results | This query detects packages vulnerable to CVE-2019-0657. |
|
| Using a package with a known vulnerability (`cs/use-of-vulnerable-package`) | More results | This query detects packages vulnerable to CVE-2019-0657. |
|
||||||
|
|
||||||
## Changes to code extraction
|
## Changes to code extraction
|
||||||
@@ -26,14 +26,13 @@
|
|||||||
## Changes to QL libraries
|
## Changes to QL libraries
|
||||||
|
|
||||||
* The class `TrivialProperty` now includes library properties determined to be trivial using CIL analysis. This may increase the number of results for all queries that use data flow.
|
* The class `TrivialProperty` now includes library properties determined to be trivial using CIL analysis. This may increase the number of results for all queries that use data flow.
|
||||||
* Taint-tracking steps have been added for the `Json.NET` package. This will improve results for queries that use taint-tracking.
|
* Taint-tracking steps have been added for the `Json.NET` package. This will improve results for queries that use taint tracking.
|
||||||
* Support has been added for EntityFrameworkCore, including
|
* Support has been added for EntityFrameworkCore, including
|
||||||
- Stored data flow sources
|
- Stored data flow sources
|
||||||
- Sinks for SQL expressions
|
- Sinks for SQL expressions
|
||||||
- Data flow through fields that are mapped to the database.
|
- Data flow through fields that are mapped to the database
|
||||||
* Support has been added for NHibernate-Core, including
|
* Support has been added for NHibernate-Core, including
|
||||||
- Stored data flow sources
|
- Stored data flow sources
|
||||||
- Sinks for SQL expressions
|
- Sinks for SQL expressions
|
||||||
- Data flow through fields that are mapped to the database.
|
- Data flow through fields that are mapped to the database
|
||||||
|
|
||||||
## Changes to the autobuilder
|
|
||||||
|
|||||||
Reference in New Issue
Block a user