File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed
java/ql/src/semmle/code/java/security Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -12,7 +12,7 @@ import semmle.code.java.security.SensitiveActions
12
12
private string getAndroidSensitiveInfoRegex ( ) { result = "(?i).*(email|phone|ticket).*" }
13
13
14
14
/** Finds variables that hold sensitive information judging by their names. */
15
- class SensitiveInfoExpr extends Expr {
15
+ private class SensitiveInfoExpr extends Expr {
16
16
SensitiveInfoExpr ( ) {
17
17
exists ( Variable v | this = v .getAnAccess ( ) |
18
18
v .getName ( ) .regexpMatch ( [ getCommonSensitiveInfoRegex ( ) , getAndroidSensitiveInfoRegex ( ) ] )
@@ -23,7 +23,7 @@ class SensitiveInfoExpr extends Expr {
23
23
/**
24
24
* A method access of the `Context.sendBroadcast` family.
25
25
*/
26
- class SendBroadcastMethodAccess extends MethodAccess {
26
+ private class SendBroadcastMethodAccess extends MethodAccess {
27
27
SendBroadcastMethodAccess ( ) {
28
28
this .getMethod ( ) .getDeclaringType ( ) .getASourceSupertype * ( ) instanceof TypeContext and
29
29
this .getMethod ( ) .getName ( ) .matches ( "send%Broadcast%" )
@@ -53,7 +53,7 @@ private predicate isEmptyArrayArg(Expr ex) {
53
53
/**
54
54
* Holds if a `sendBroadcast` call doesn't specify receiver permission.
55
55
*/
56
- predicate isSensitiveBroadcastSink ( DataFlow:: Node sink ) {
56
+ private predicate isSensitiveBroadcastSink ( DataFlow:: Node sink ) {
57
57
exists ( SendBroadcastMethodAccess ma , string name | ma .getMethod ( ) .hasName ( name ) |
58
58
sink .asExpr ( ) = ma .getAnArgument ( ) and
59
59
(
You can’t perform that action at this time.
0 commit comments