mirror of
https://github.com/github/codeql.git
synced 2026-05-19 05:37:10 +02:00
1.9 KiB
1.9 KiB
9.1.0
New Features
- Data flow barriers and barrier guards can now be added using data extensions. For more information see Customizing library models for Java and Kotlin.
Minor Analysis Improvements
- Added
sql-injectionsink models for the Hibernateorg.hibernate.query.QueryProducermethodscreateNativeMutationQuery,createMutationQuery, andcreateSelectionQuery. - The
java/partial-path-traversalandjava/partial-path-traversal-from-remotequeries now correctly recognize file separator appends using+=. - The
java/path-injectionandjava/zipslipqueries now recognizePath.toRealPath()as a path normalization sanitizer, consistent with the existing treatment ofPath.normalize()andFile.getCanonicalPath(). This reduces false positives for code that uses the NIO.2 API for path canonicalization. - The
java/sensitive-logquery now excludes additional common variable naming patterns that do not hold sensitive data, reducing false positives. This includes pagination/iteration tokens (nextToken,pageToken,continuationToken), token metadata (tokenType,tokenEndpoint,tokenCount), and secret metadata (secretName,secretId,secretVersion). - The
java/sensitive-logquery now treats method calls whose names contain "encrypt", "hash", or "digest" as sanitizers, consistent with the existing treatment injava/cleartext-storage-in-log. This reduces false positives when sensitive data is hashed or encrypted before logging. - The
java/trust-boundary-violationquery now recognizes regular expression checks (includingString.matches()guards and@javax.validation.constraints.Patternannotations) as sanitizers, consistent with the existing treatment of ESAPI validators. This reduces false positives when input is validated against a pattern before being stored in a session.