Files
codeql/javascript/ql/test/query-tests/Security/CWE-730/client-side.js
2021-03-16 13:28:11 +00:00

5 lines
177 B
JavaScript

function foo() {
let taint = window.location.hash.substring(1);
new RegExp(taint); // OK - we do not flag RegExp injection on the client side as the impact is too low
}