Rename Default* to External* for MaD classes

This commit is contained in:
Owen Mansel-Chan
2026-01-06 15:56:03 +00:00
parent 7fff3534fa
commit 8602c4c57c
11 changed files with 27 additions and 27 deletions

View File

@@ -116,10 +116,10 @@ module FileSystemAccess {
}
}
private class DefaultFileSystemAccess extends FileSystemAccess::Range, DataFlow::CallNode {
private class ExternalFileSystemAccess extends FileSystemAccess::Range, DataFlow::CallNode {
DataFlow::ArgumentNode pathArgument;
DefaultFileSystemAccess() {
ExternalFileSystemAccess() {
sinkNode(pathArgument, "path-injection") and
this = pathArgument.getCall()
}
@@ -394,10 +394,10 @@ module LoggerCall {
}
}
private class DefaultLoggerCall extends LoggerCall::Range, DataFlow::CallNode {
private class ExternalLoggerCall extends LoggerCall::Range, DataFlow::CallNode {
DataFlow::ArgumentNode messageComponent;
DefaultLoggerCall() {
ExternalLoggerCall() {
sinkNode(messageComponent, "log-injection") and
this = messageComponent.getCall()
}

View File

@@ -320,11 +320,11 @@ module Http {
)
}
private class DefaultHttpRedirect extends Range, DataFlow::CallNode {
private class ExternalHttpRedirect extends Range, DataFlow::CallNode {
DataFlow::ArgumentNode url;
int rw;
DefaultHttpRedirect() {
ExternalHttpRedirect() {
this = url.getCall() and
exists(string kind |
sinkKindInfo(kind, rw) and

View File

@@ -24,8 +24,8 @@ module NoSql {
*/
abstract class Range extends DataFlow::Node { }
private class DefaultQueryString extends Range {
DefaultQueryString() {
private class ExternalQueryString extends Range {
ExternalQueryString() {
exists(DataFlow::ArgumentNode arg | sinkNode(arg, "nosql-injection") |
this = arg.getACorrespondingSyntacticArgument()
)

View File

@@ -67,8 +67,8 @@ module SQL {
*/
abstract class Range extends DataFlow::Node { }
private class DefaultQueryString extends Range {
DefaultQueryString() {
private class ExternalQueryString extends Range {
ExternalQueryString() {
exists(DataFlow::ArgumentNode arg | sinkNode(arg, "sql-injection") |
not arg instanceof DataFlow::ImplicitVarargsSlice and
this = arg

View File

@@ -5,12 +5,12 @@
import go
private class DefaultSystemCommandExecution extends SystemCommandExecution::Range,
private class ExternalSystemCommandExecution extends SystemCommandExecution::Range,
DataFlow::CallNode
{
DataFlow::ArgumentNode commandName;
DefaultSystemCommandExecution() {
ExternalSystemCommandExecution() {
sinkNode(commandName, "command-injection") and
this = commandName.getCall()
}

View File

@@ -25,8 +25,8 @@ module XPath {
*/
abstract class Range extends DataFlow::Node { }
private class DefaultXPathExpressionString extends Range {
DefaultXPathExpressionString() { sinkNode(this, "xpath-injection") }
private class ExternalXPathExpressionString extends Range {
ExternalXPathExpressionString() { sinkNode(this, "xpath-injection") }
}
}

View File

@@ -39,10 +39,10 @@ module Regexp {
)
}
private class DefaultRegexpPattern extends RegexpPattern::Range, DataFlow::ArgumentNode {
private class ExternalRegexpPattern extends RegexpPattern::Range, DataFlow::ArgumentNode {
int strArg;
DefaultRegexpPattern() {
ExternalRegexpPattern() {
exists(string kind |
regexSinkKindInfo(kind, strArg) and
sinkNode(this, kind)
@@ -61,12 +61,12 @@ module Regexp {
}
}
private class DefaultRegexpMatchFunction extends RegexpMatchFunction::Range, Function {
private class ExternalRegexpMatchFunction extends RegexpMatchFunction::Range, Function {
int patArg;
int strArg;
DefaultRegexpMatchFunction() {
exists(DefaultRegexpPattern drp, string kind |
ExternalRegexpMatchFunction() {
exists(ExternalRegexpPattern drp, string kind |
drp.getCall() = this.getACall() and
sinkNode(drp, kind)
|

View File

@@ -43,8 +43,8 @@ module HardcodedCredentials {
}
/** A use of a credential. */
private class CredentialsSink extends Sink {
CredentialsSink() { exists(string s | s.matches("credentials-%") | sinkNode(this, s)) }
private class ExternalCredentialsSink extends Sink {
ExternalCredentialsSink() { exists(string s | s.matches("credentials-%") | sinkNode(this, s)) }
}
/** A use of a credential. */

View File

@@ -51,8 +51,8 @@ module MissingJwtSignatureCheck {
private class DefaultSource extends Source instanceof ActiveThreatModelSource { }
private class DefaultSink extends Sink {
DefaultSink() { sinkNode(this, "jwt") }
private class ExternalSink extends Sink {
ExternalSink() { sinkNode(this, "jwt") }
}
private class ExternalSanitizer extends Sanitizer {

View File

@@ -44,10 +44,10 @@ module RequestForgery {
*/
private class ThreatModelFlowAsSource extends Source instanceof ActiveThreatModelSource { }
private class DefaultRequestForgerySink extends Sink {
private class ExternalRequestForgerySink extends Sink {
string kind;
DefaultRequestForgerySink() {
ExternalRequestForgerySink() {
exists(string modelKind | sinkNode(this, modelKind) |
modelKind = "request-forgery" and kind = "URL"
or

View File

@@ -49,8 +49,8 @@ module SharedXss {
override Locatable getAssociatedLoc() { result = this.getRead().getEnclosingTextNode() }
}
private class DefaultSink extends Sink {
DefaultSink() { sinkNode(this, ["html-injection", "js-injection"]) }
private class ExternalSink extends Sink {
ExternalSink() { sinkNode(this, ["html-injection", "js-injection"]) }
}
/**