From 97dad2db1725349232539c98e2f31945c497422b Mon Sep 17 00:00:00 2001
From: Simon Friis Vindum
Date: Thu, 27 Nov 2025 11:43:41 +0100
Subject: [PATCH] Rust: Apply suggestions from docs review
Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com>
---
rust/ql/src/queries/security/CWE-079/XSS.qhelp | 14 +++++++-------
rust/ql/src/queries/security/CWE-079/XSS.ql | 2 +-
2 files changed, 8 insertions(+), 8 deletions(-)
diff --git a/rust/ql/src/queries/security/CWE-079/XSS.qhelp b/rust/ql/src/queries/security/CWE-079/XSS.qhelp
index 38c361bd62f..13b7c026f3c 100644
--- a/rust/ql/src/queries/security/CWE-079/XSS.qhelp
+++ b/rust/ql/src/queries/security/CWE-079/XSS.qhelp
@@ -4,8 +4,8 @@
-Directly writing user input (for example, an HTTP request parameter) to a web
-page, without properly sanitizing the input first, allows for a cross-site
+
Directly writing user input (for example, an HTTP request parameter) to a webpage,
+without properly sanitizing the input first, allows for a cross-site
scripting vulnerability.
@@ -23,9 +23,9 @@ scripting:
To fix this vulnerability, the user input should be HTML-encoded before being
-included in the response. In the following example encode_text from
+included in the response. In the following example, encode_text from
the html_escape
-crate is used:
+crate is used to achieve this:
@@ -34,15 +34,15 @@ crate is used:
OWASP:
- XSS
- (Cross Site Scripting) Prevention Cheat Sheet.
+
+Cross Site Scripting Prevention Cheat Sheet.
Wikipedia: Cross-site scripting.
OWASP:
- Cross-site Scripting (XSS).
+ Cross Site Scripting (XSS).
diff --git a/rust/ql/src/queries/security/CWE-079/XSS.ql b/rust/ql/src/queries/security/CWE-079/XSS.ql
index 58fb77422ae..3c43f5043c7 100644
--- a/rust/ql/src/queries/security/CWE-079/XSS.ql
+++ b/rust/ql/src/queries/security/CWE-079/XSS.ql
@@ -1,6 +1,6 @@
/**
* @name Cross-site scripting
- * @description Writing user input directly to a web page
+ * @description Writing user input directly to a webpage
* allows for a cross-site scripting vulnerability.
* @kind path-problem
* @problem.severity error