From 409a6aa1373db2063058cdc14a59c3d3887895ae Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Alvaro=20Mu=C3=B1oz?= Date: Wed, 8 May 2024 18:48:16 +0200 Subject: [PATCH] Update ql/src/Security/CWE-349/CachePoisoning.ql MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Co-authored-by: Jaroslav Lobačevski --- ql/src/Security/CWE-349/CachePoisoning.ql | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ql/src/Security/CWE-349/CachePoisoning.ql b/ql/src/Security/CWE-349/CachePoisoning.ql index bf18df4797d..a1436fd6fe3 100644 --- a/ql/src/Security/CWE-349/CachePoisoning.ql +++ b/ql/src/Security/CWE-349/CachePoisoning.ql @@ -43,4 +43,4 @@ where // (The cache specific token can be leaked even for non-privileged workflows) checkout.getAFollowingStep() instanceof PoisonableStep ) -select checkout, "Potential cache poisoning on privileged workflow." +select checkout, "Potential cache poisoning of a default branch."