diff --git a/python/ql/src/experimental/Security/CWE-208/TimingAttackAgainstHash/PossibleTimingAttackAgainstHash.ql b/python/ql/src/experimental/Security/CWE-208/TimingAttackAgainstHash/PossibleTimingAttackAgainstHash.ql index 6659d562633..8c8c9938e15 100644 --- a/python/ql/src/experimental/Security/CWE-208/TimingAttackAgainstHash/PossibleTimingAttackAgainstHash.ql +++ b/python/ql/src/experimental/Security/CWE-208/TimingAttackAgainstHash/PossibleTimingAttackAgainstHash.ql @@ -15,7 +15,6 @@ import python import semmle.python.dataflow.new.DataFlow import semmle.python.dataflow.new.TaintTracking -import semmle.python.ApiGraphs import experimental.semmle.python.security.TimingAttack import DataFlow::PathGraph @@ -35,3 +34,4 @@ from PossibleTimingAttackAgainstHash config, DataFlow::PathNode source, DataFlow where config.hasFlowPath(source, sink) select sink.getNode(), source, sink, "Possible Timing attack against $@ validation.", source, source.getNode() +