Add live literals as sanitizers for sensitive logging

This commit is contained in:
Tony Torralba
2022-05-05 12:32:10 +02:00
parent 5db8306fef
commit f0a0ac100b
2 changed files with 9 additions and 1 deletions

View File

@@ -1,4 +1,7 @@
---
category: minorAnalysis
---
* Query `java/sensitive-log` no longer considers usernames as sensitive information. Also, the conditions to consider a variable a constant (and therefore exclude it as user-provided sensitive information) have been tightened.
* Query `java/sensitive-log` has received several improvements.
* It no longer considers usernames as sensitive information.
* The conditions to consider a variable a constant (and therefore exclude it as user-provided sensitive information) have been tightened.
* A sanitizer has been added to handle certain elements introduced by a Kotlin compiler plugin that have deceptive names.