From 9f8ed710e28870ccd1044c53055bcce57ce062cf Mon Sep 17 00:00:00 2001 From: Ben Rodes Date: Tue, 10 Feb 2026 11:09:25 -0500 Subject: [PATCH] Update python/ql/test/query-tests/Security/CWE-918-ServerSideRequestForgery/test_path_validation.py Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> --- .../CWE-918-ServerSideRequestForgery/test_path_validation.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/python/ql/test/query-tests/Security/CWE-918-ServerSideRequestForgery/test_path_validation.py b/python/ql/test/query-tests/Security/CWE-918-ServerSideRequestForgery/test_path_validation.py index 3e6bb1f6d0c..4560479d2b3 100644 --- a/python/ql/test/query-tests/Security/CWE-918-ServerSideRequestForgery/test_path_validation.py +++ b/python/ql/test/query-tests/Security/CWE-918-ServerSideRequestForgery/test_path_validation.py @@ -56,8 +56,8 @@ def urivalidator_path_in_azure_storage_domain_validation(credential): def complex_urivalidator_checks(credential, trusted_domain): user_input = request.args['untrusted_input'] # Focus on in_domain only here for simplicity - # It assumed the logic underlying checking paths would apply - # similarly other validator methods + # It is assumed that the logic underlying path checking would apply + # similarly to other validator methods. url = f"https://{user_input}" if not URIValidator.in_domain(url, trusted_domain):