mirror of
https://github.com/github/codeql.git
synced 2026-04-24 08:15:14 +02:00
Moved from experimental into default queries
This commit is contained in:
@@ -1,6 +1,8 @@
|
||||
---
|
||||
category: minorAnalysis
|
||||
---
|
||||
* Added a new query, `js/functionality-from-untrusted-domain`, which detects uses in HTML and JavaScript scripts from untrusted domains, including the compromised `polyfill.io` content delivery network, and can be extended to detect other compromised scripts using data extensions.
|
||||
* Modified existing query, `js/functionality-from-untrusted-source`, to allow adding this new query, but reusing the same logic.
|
||||
* Created a shared library, `semmle.javascript.security.FunctionalityFromUntrustedSource`, to separate the logic from that existing query and allow having a separate "untrusted domain" query.
|
||||
* Added a new query, `js/functionality-from-untrusted-domain`, which detects uses in HTML and JavaScript scripts from untrusted domains, including the `polyfill.io` content delivery network
|
||||
* it can be extended to detect other compromised scripts using user-provided data extensions of the `untrustedDomain` predicate, which takes one string argument with the domain to warn on (and will warn on any subdomains too).
|
||||
* Modified existing query, `js/functionality-from-untrusted-source`, to allow adding this new query, but reusing the same logic
|
||||
* Added the ability to use data extensions to require SRI on CDN hostnames using the `isCdnDomainWithCheckingRequired` predicate, which takes one string argument of the full hostname to require SRI for.
|
||||
* Created a new library, `semmle.javascript.security.FunctionalityFromUntrustedSource`, to support both queries.
|
||||
|
||||
@@ -1 +0,0 @@
|
||||
experimental/Security/CWE-830/FunctionalityFromUntrustedDomain.ql
|
||||
@@ -0,0 +1 @@
|
||||
Security/CWE-830/FunctionalityFromUntrustedDomain.ql
|
||||
Reference in New Issue
Block a user