Python: reasoning about => detecting

Co-authored-by: yoff <lerchedahl@gmail.com>
This commit is contained in:
Rasmus Wriedt Larsen
2020-11-09 09:01:04 +01:00
committed by GitHub
parent 9ebe59d393
commit ed0e4f8425
6 changed files with 11 additions and 11 deletions

View File

@@ -1,5 +1,5 @@
/**
* Provides a taint-tracking configuration for reasoning about code injection
* Provides a taint-tracking configuration for detecting code injection
* vulnerabilities.
*/
@@ -10,7 +10,7 @@ import semmle.python.Concepts
import semmle.python.dataflow.new.RemoteFlowSources
/**
* A taint-tracking configuration for reasoning about code injection vulnerabilities.
* A taint-tracking configuration for detecting code injection vulnerabilities.
*/
class CodeInjectionConfiguration extends TaintTracking::Configuration {
CodeInjectionConfiguration() { this = "CodeInjectionConfiguration" }

View File

@@ -1,5 +1,5 @@
/**
* Provides a taint-tracking configuration for reasoning about command injection
* Provides a taint-tracking configuration for detecting command injection
* vulnerabilities.
*/
@@ -10,7 +10,7 @@ import semmle.python.Concepts
import semmle.python.dataflow.new.RemoteFlowSources
/**
* A taint-tracking configuration for reasoning about command injection vulnerabilities.
* A taint-tracking configuration for detecting command injection vulnerabilities.
*/
class CommandInjectionConfiguration extends TaintTracking::Configuration {
CommandInjectionConfiguration() { this = "CommandInjectionConfiguration" }

View File

@@ -1,5 +1,5 @@
/**
* Provides a taint-tracking configuration for reasoning about path injection
* Provides a taint-tracking configuration for detecting path injection
* vulnerabilities.
*
* We detect cases where a user-controlled path is used in an unsafe manner,

View File

@@ -1,5 +1,5 @@
/**
* Provides a taint-tracking configuration for reasoning about reflected server-side
* Provides a taint-tracking configuration for detecting reflected server-side
* cross-site scripting vulnerabilities.
*/
@@ -10,7 +10,7 @@ import semmle.python.Concepts
import semmle.python.dataflow.new.RemoteFlowSources
/**
* A taint-tracking configuration for reasoning about reflected server-side cross-site
* A taint-tracking configuration for detecting reflected server-side cross-site
* scripting vulnerabilities.
*/
class ReflectedXssConfiguration extends TaintTracking::Configuration {

View File

@@ -1,5 +1,5 @@
/**
* Provides a taint-tracking configuration for reasoning about SQL injection
* Provides a taint-tracking configuration for detecting SQL injection
* vulnerabilities.
*/
@@ -10,7 +10,7 @@ import semmle.python.Concepts
import semmle.python.dataflow.new.RemoteFlowSources
/**
* A taint-tracking configuration for reasoning about SQL injection vulnerabilities.
* A taint-tracking configuration for detecting SQL injection vulnerabilities.
*/
class SQLInjectionConfiguration extends TaintTracking::Configuration {
SQLInjectionConfiguration() { this = "SQLInjectionConfiguration" }

View File

@@ -1,5 +1,5 @@
/**
* Provides a taint-tracking configuration for reasoning about arbitrary code execution
* Provides a taint-tracking configuration for detecting arbitrary code execution
* vulnerabilities due to deserializing user-controlled data.
*/
@@ -10,7 +10,7 @@ import semmle.python.Concepts
import semmle.python.dataflow.new.RemoteFlowSources
/**
* A taint-tracking configuration for reasoning about arbitrary code execution
* A taint-tracking configuration for detecting arbitrary code execution
* vulnerabilities due to deserializing user-controlled data.
*/
class UnsafeDeserializationConfiguration extends TaintTracking::Configuration {