mirror of
https://github.com/github/codeql.git
synced 2025-12-16 16:53:25 +01:00
JavaScript: Lower precision of PasswordInConfigurationFile.
In spite of recent improvements, this query is still too noisy to show by default.
This commit is contained in:
@@ -40,7 +40,7 @@
|
||||
| Expression has no effect | Fewer false-positive results | This rule now treats uses of `Object.defineProperty` more conservatively. |
|
||||
| Incomplete regular expression for hostnames | More results | This rule now tracks regular expressions for host names further. |
|
||||
| Incomplete string escaping or encoding | More results | This rule now considers the flow of regular expressions literals, and it no longer flags the removal of trailing newlines. |
|
||||
| Password in configuration file | Fewer false positive results | This query now excludes passwords that are inserted into the configuration file using a templating mechanism or read from environment variables. |
|
||||
| Password in configuration file | Fewer false positive results | This query now excludes passwords that are inserted into the configuration file using a templating mechanism or read from environment variables. Results are no longer shown on LGTM by default. |
|
||||
| Replacement of a substring with itself | More results | This rule now considers the flow of regular expressions literals. |
|
||||
| Server-side URL redirect | Fewer false-positive results | This rule now treats URLs as safe in more cases where the hostname cannot be tampered with. |
|
||||
| Type confusion through parameter tampering | Fewer false-positive results | This rule now recognizes additional emptiness checks. |
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
* @description Storing unencrypted passwords in configuration files is unsafe.
|
||||
* @kind problem
|
||||
* @problem.severity warning
|
||||
* @precision high
|
||||
* @precision medium
|
||||
* @id js/password-in-configuration-file
|
||||
* @tags security
|
||||
* external/cwe/cwe-256
|
||||
|
||||
Reference in New Issue
Block a user