mirror of
https://github.com/github/codeql.git
synced 2025-12-16 16:53:25 +01:00
1.5 KiB
1.5 KiB
0.9.0
Breaking Changes
- The CIL extractor has been deleted and the corresponding extractor option
cilhas been removed. It is no longer possible to do CIL extraction. - The QL library C# classes no longer extend their corresponding
DotNetclasses. Furthermore, CIL related data flow functionality has been deleted and allDotNetandCILrelated classes have been deprecated. This effectively means that it no longer has any effect to enable CIL extraction.
Minor Analysis Improvements
- Added new source models for the
Dapperpackage. These models can be enabled by enabling thedatabasethreat model. - Additional models have been added for
System.IO. These are primarily source models with thefilethreat model, and summaries related to reading from a file or stream. - Support for C# 12 / .NET8.
- Added the
windows-registrysource kind and threat model to represent values which come from the registry on Windows. - The models for
System.Net.Http.HttpRequestMessagehave been modified to better model the flow of tainted URIs. - The .NET standard libraries APIs for accessing command line arguments and environment variables have been modeled using the
commandargsandenvironmentthreat models. - The
cs/assembly-path-injectionquery has been modified so that it's sources rely onThreatModelFlowSource. In order to restore results from command line arguments, you should enable thecommandargsthreat model. - The models for
System.IO.TextReaderhave been modified to better model the flow of tainted text from aTextReader.