diff --git a/javascript/ql/experimental/adaptivethreatmodeling/modelbuilding/extraction/ExtractEndpointMapping.ql b/javascript/ql/experimental/adaptivethreatmodeling/modelbuilding/extraction/ExtractEndpointMapping.ql index 11986562085..5d80a3f2e20 100644 --- a/javascript/ql/experimental/adaptivethreatmodeling/modelbuilding/extraction/ExtractEndpointMapping.ql +++ b/javascript/ql/experimental/adaptivethreatmodeling/modelbuilding/extraction/ExtractEndpointMapping.ql @@ -4,15 +4,19 @@ * Maps ML-powered queries to their `EndpointType` for clearer labelling while evaluating ML model during training. */ -import experimental.adaptivethreatmodeling.SqlInjectionATM as SqlInjectionATM +import experimental.adaptivethreatmodeling.CodeInjectionATM as CodeInjectionATM import experimental.adaptivethreatmodeling.NosqlInjectionATM as NosqlInjectionATM +import experimental.adaptivethreatmodeling.SqlInjectionATM as SqlInjectionATM import experimental.adaptivethreatmodeling.TaintedPathATM as TaintedPathATM import experimental.adaptivethreatmodeling.XssATM as XssATM +import experimental.adaptivethreatmodeling.XssThroughDomATM as XssThroughDomATM import experimental.adaptivethreatmodeling.AdaptiveThreatModeling from string queryName, AtmConfig c, EndpointType e where ( + queryName = "CodeInjection" and c instanceof CodeInjectionATM::CodeInjectionAtmConfig + or queryName = "SqlInjection" and c instanceof SqlInjectionATM::SqlInjectionAtmConfig or @@ -23,6 +27,8 @@ where c instanceof TaintedPathATM::TaintedPathAtmConfig or queryName = "Xss" and c instanceof XssATM::DomBasedXssAtmConfig + or + queryName = "XssThroughDom" and c instanceof XssThroughDomATM::XssThroughDomAtmConfig ) and e = c.getASinkEndpointType() select queryName, e.getEncoding() as label