mirror of
https://github.com/github/codeql.git
synced 2026-01-26 21:02:58 +01:00
34 lines
1.2 KiB
Plaintext
34 lines
1.2 KiB
Plaintext
/** Provides configurations for sensitive logging queries. */
|
|
|
|
import java
|
|
private import semmle.code.java.dataflow.ExternalFlow
|
|
import semmle.code.java.dataflow.TaintTracking
|
|
import semmle.code.java.security.SensitiveActions
|
|
import semmle.code.java.frameworks.android.Compose
|
|
import DataFlow
|
|
|
|
/** A variable that may hold sensitive information, judging by its name. */
|
|
class CredentialExpr extends Expr {
|
|
CredentialExpr() {
|
|
exists(Variable v | this = v.getAnAccess() |
|
|
v.getName().regexpMatch(getCommonSensitiveInfoRegex()) and
|
|
not this instanceof CompileTimeConstantExpr
|
|
)
|
|
}
|
|
}
|
|
|
|
/** A data-flow configuration for identifying potentially-sensitive data flowing to a log output. */
|
|
class SensitiveLoggerConfiguration extends TaintTracking::Configuration {
|
|
SensitiveLoggerConfiguration() { this = "SensitiveLoggerConfiguration" }
|
|
|
|
override predicate isSource(DataFlow::Node source) { source.asExpr() instanceof CredentialExpr }
|
|
|
|
override predicate isSink(DataFlow::Node sink) { sinkNode(sink, "logging") }
|
|
|
|
override predicate isSanitizer(DataFlow::Node sanitizer) {
|
|
sanitizer.asExpr() instanceof LiveLiteral
|
|
}
|
|
|
|
override predicate isSanitizerIn(Node node) { isSource(node) }
|
|
}
|