Files
codeql/javascript/ql/test/library-tests
Rasmus Wriedt Larsen 61e60de969 JS: Model readline as a stdin threat-model source
Technically not always true, but my assumption is that +90% of the time
that's what it will be used for, so while we could be more precise by
adding a taint-step from the `input` part of the construction, I'm not
sure it's worth it in this case.

Furthermore, doing so would break with the current way we model
threat-model sources, and how sources are generally modeled in JS... so
for a very pretty setup it would require changing all the other `file`
threat-model sources to start at the constructors such as
`fs.createReadStream()` and have taint-propagation steps towards the
actual use (like we do in Python)...

I couldn't see an easy path forwards for doing this while keeping the
Concepts integration, so I opted for the simpler solution here.
2024-10-31 14:29:30 +01:00
..
2019-01-11 11:02:42 +01:00
2019-01-11 11:02:42 +01:00
2020-03-27 14:54:34 +01:00
2024-02-13 18:30:23 +01:00
2019-01-11 11:02:42 +01:00
2022-11-09 09:36:03 +01:00
2024-10-04 08:35:33 +02:00
2019-01-11 11:02:42 +01:00
2020-10-16 18:13:13 +01:00
2024-06-14 14:49:34 +02:00
2023-06-01 23:20:23 +02:00
2020-10-20 14:27:09 +02:00
2019-01-11 11:02:42 +01:00
2023-07-11 15:24:09 +02:00
2023-04-27 10:57:38 +02:00
2020-10-20 14:27:09 +02:00
2024-10-04 08:35:33 +02:00
2024-10-04 08:35:33 +02:00
2021-02-23 10:03:17 +01:00
2023-05-02 12:00:42 +09:00
2021-10-01 12:02:40 +02:00
2019-01-11 11:02:42 +01:00
2019-07-17 09:16:15 +01:00
2020-04-14 10:31:31 +01:00
2022-09-20 11:40:17 +02:00
2020-04-14 10:31:31 +01:00
2019-01-11 11:02:42 +01:00
2023-07-11 11:37:30 +02:00
2024-02-14 10:45:51 +01:00
2019-01-11 11:02:42 +01:00
2020-09-03 14:01:40 +01:00
2022-08-22 14:08:31 +02:00
2022-11-09 09:36:03 +01:00