Skip to content

Commit 8482934

Browse files
committed
Update customizing-library-models-for-java-and-kotlin.rst
1 parent 7f3ff7f commit 8482934

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

docs/codeql/codeql-language-guides/customizing-library-models-for-java-and-kotlin.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -292,7 +292,7 @@ The first four values identify the callable (in this case a method) to be modele
292292
- The fifth value ``summary`` is the kind of the neutral.
293293
- The sixth value ``manual`` is the provenance of the neutral.
294294

295-
.. _threat-models
295+
.. _threat-models:
296296

297297
Threat models
298298
-------------
@@ -306,4 +306,4 @@ Threat models
306306
- ``remote`` which represents remote HTTP requests.
307307
- ``local`` which represents data from local files (``file``), command-line arguments (``commandargs``), database reads (``database``), and environment variables(``environement``).
308308

309-
When running a CodeQL analysis, the ``remote`` threat model is included by default. You can optionally include other threat models as appropriate when using the CodeQL CLI and in GitHub code scanning. For more information see TODO.
309+
When running a CodeQL analysis, the ``remote`` threat model is included by default. You can optionally include other threat models as appropriate when using the CodeQL CLI and in GitHub code scanning. For more information, see `Analyzing your code with CodeQL queries <https://docs.github.com/code-security/codeql-cli/getting-started-with-the-codeql-cli/analyzing-your-code-with-codeql-queries#running-model-packs-to-configure-threat-models>`__ and `Customizing your advanced setup for code scanning <https://docs.github.com/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#extending-codeql-coverage-with-threat-models>`__.

0 commit comments

Comments
 (0)