mirror of
https://github.com/github/codeql.git
synced 2025-12-21 11:16:30 +01:00
Python: Fix naming style guide violations
This commit is contained in:
@@ -22,13 +22,14 @@ import experimental.semmle.python.security.TimingAttack
|
||||
* A configuration that tracks data flow from cryptographic operations
|
||||
* to equality test
|
||||
*/
|
||||
private module PossibleTimingAttackAgainstHash implements DataFlow::ConfigSig {
|
||||
private module PossibleTimingAttackAgainstHashConfig implements DataFlow::ConfigSig {
|
||||
predicate isSource(DataFlow::Node source) { source instanceof ProduceCryptoCall }
|
||||
|
||||
predicate isSink(DataFlow::Node sink) { sink instanceof NonConstantTimeComparisonSink }
|
||||
}
|
||||
|
||||
module PossibleTimingAttackAgainstHashFlow = TaintTracking::Global<PossibleTimingAttackAgainstHash>;
|
||||
module PossibleTimingAttackAgainstHashFlow =
|
||||
TaintTracking::Global<PossibleTimingAttackAgainstHashConfig>;
|
||||
|
||||
import PossibleTimingAttackAgainstHashFlow::PathGraph
|
||||
|
||||
|
||||
@@ -39,7 +39,7 @@ class TokenAssignmentValueSink extends DataFlow::Node {
|
||||
}
|
||||
}
|
||||
|
||||
private module TokenBuiltFromUUIDConfig implements DataFlow::ConfigSig {
|
||||
private module TokenBuiltFromUuidConfig implements DataFlow::ConfigSig {
|
||||
predicate isSource(DataFlow::Node source) { source instanceof PredictableResultSource }
|
||||
|
||||
predicate isSink(DataFlow::Node sink) { sink instanceof TokenAssignmentValueSink }
|
||||
@@ -54,10 +54,10 @@ private module TokenBuiltFromUUIDConfig implements DataFlow::ConfigSig {
|
||||
}
|
||||
|
||||
/** Global taint-tracking for detecting "TokenBuiltFromUUID" vulnerabilities. */
|
||||
module TokenBuiltFromUUIDFlow = TaintTracking::Global<TokenBuiltFromUUIDConfig>;
|
||||
module TokenBuiltFromUuidFlow = TaintTracking::Global<TokenBuiltFromUuidConfig>;
|
||||
|
||||
import TokenBuiltFromUUIDFlow::PathGraph
|
||||
import TokenBuiltFromUuidFlow::PathGraph
|
||||
|
||||
from TokenBuiltFromUUIDFlow::PathNode source, TokenBuiltFromUUIDFlow::PathNode sink
|
||||
where TokenBuiltFromUUIDFlow::flowPath(source, sink)
|
||||
from TokenBuiltFromUuidFlow::PathNode source, TokenBuiltFromUuidFlow::PathNode sink
|
||||
where TokenBuiltFromUuidFlow::flowPath(source, sink)
|
||||
select sink.getNode(), source, sink, "Token built from $@.", source.getNode(), "predictable value"
|
||||
|
||||
@@ -12,9 +12,9 @@
|
||||
|
||||
// determine precision above
|
||||
import python
|
||||
import LDAPInsecureAuthFlow::PathGraph
|
||||
import experimental.semmle.python.security.LDAPInsecureAuth
|
||||
import LdapInsecureAuthFlow::PathGraph
|
||||
|
||||
from LDAPInsecureAuthFlow::PathNode source, LDAPInsecureAuthFlow::PathNode sink
|
||||
where LDAPInsecureAuthFlow::flowPath(source, sink)
|
||||
from LdapInsecureAuthFlow::PathNode source, LdapInsecureAuthFlow::PathNode sink
|
||||
where LdapInsecureAuthFlow::flowPath(source, sink)
|
||||
select sink.getNode(), source, sink, "This LDAP host is authenticated insecurely."
|
||||
|
||||
@@ -21,7 +21,7 @@ module InsecureRandomness {
|
||||
* A taint-tracking configuration for reasoning about random values that are
|
||||
* not cryptographically secure.
|
||||
*/
|
||||
private module Configuration implements DataFlow::ConfigSig {
|
||||
private module Config implements DataFlow::ConfigSig {
|
||||
predicate isSource(DataFlow::Node source) { source instanceof Source }
|
||||
|
||||
predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
|
||||
@@ -30,5 +30,5 @@ module InsecureRandomness {
|
||||
}
|
||||
|
||||
/** Global taint-tracking for detecting "random values that are not cryptographically secure" vulnerabilities. */
|
||||
module Flow = TaintTracking::Global<Configuration>;
|
||||
module Flow = TaintTracking::Global<Config>;
|
||||
}
|
||||
|
||||
@@ -88,7 +88,7 @@ class LdapStringVar extends BinaryExpr {
|
||||
/**
|
||||
* A taint-tracking configuration for detecting LDAP insecure authentications.
|
||||
*/
|
||||
private module LDAPInsecureAuthConfig implements DataFlow::ConfigSig {
|
||||
private module LdapInsecureAuthConfig implements DataFlow::ConfigSig {
|
||||
predicate isSource(DataFlow::Node source) {
|
||||
source instanceof RemoteFlowSource or
|
||||
source.asExpr() instanceof LdapFullHost or
|
||||
@@ -104,4 +104,4 @@ private module LDAPInsecureAuthConfig implements DataFlow::ConfigSig {
|
||||
}
|
||||
|
||||
/** Global taint-tracking for detecting "LDAP insecure authentications" vulnerabilities. */
|
||||
module LDAPInsecureAuthFlow = TaintTracking::Global<LDAPInsecureAuthConfig>;
|
||||
module LdapInsecureAuthFlow = TaintTracking::Global<LdapInsecureAuthConfig>;
|
||||
|
||||
Reference in New Issue
Block a user