mirror of
https://github.com/github/codeql.git
synced 2026-04-22 23:35:14 +02:00
Add "tokenizer" to sensitive variable name FPs
This commit is contained in:
@@ -41,9 +41,12 @@ string getCommonSensitiveInfoRegex() {
|
||||
* indicate the value being held does not contains sensitive information,
|
||||
* but is a false positive for `getCommonSensitiveInfoRegex`.
|
||||
*
|
||||
* - "tokenizer" is often used for java.util.StringTokenizer.
|
||||
* - "tokenImage" appears in parser code generated by JavaCC.
|
||||
*/
|
||||
string getCommonSensitiveInfoFPRegex() { result = "(?i).*(null).*" or result = "tokenImage" }
|
||||
string getCommonSensitiveInfoFPRegex() {
|
||||
result = "(?i).*(null|tokenizer).*" or result = "tokenImage"
|
||||
}
|
||||
|
||||
/** An expression that might contain sensitive data. */
|
||||
abstract class SensitiveExpr extends Expr { }
|
||||
|
||||
@@ -8,6 +8,6 @@ class Test {
|
||||
logger.error("Auth failed for: " + authToken); // $ hasTaintFlow
|
||||
logger.error("Auth failed for: " + username); // Safe
|
||||
logger.error("Auth failed for: " + nullToken); // Safe
|
||||
logger.error("Auth failed for: " + stringTokenizer); // $ hasTaintFlow
|
||||
logger.error("Auth failed for: " + stringTokenizer); // Safe
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user