We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 7d74125 commit 138ce42Copy full SHA for 138ce42
go/ql/src/Security/CWE-770/UncontrolledAllocationSize.qhelp
@@ -19,12 +19,12 @@
19
of size <code>n</code> without further verification, potentially exhausting all the available
20
memory.</p>
21
22
- <sample src="UncontrolledAllocationSize.go" />
+ <sample src="UncontrolledAllocationSizeBad.go" />
23
24
<p>One way to prevent this vulnerability is by implementing a maximum allowed value for the
25
user-controlled input, as seen in the following example:</p>
26
27
+ <sample src="UncontrolledAllocationSizeGood.go" />
28
</example>
29
30
<references>
0 commit comments