Skip to content

Commit 8b8cebd

Browse files
atorralbasubatoi
andauthored
Apply suggestions from code review
Co-authored-by: Ben Ahmady <[email protected]>
1 parent 582f341 commit 8b8cebd

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

go/ql/src/Security/CWE-347/MissingJwtSignatureCheck.qhelp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@
99
library, or use a library that verifies it by default.</p>
1010
</recommendation>
1111
<example>
12-
<p>The following example shows a case where a JWT is parsed without verifying the
12+
<p>The following (bad) example shows a case where a JWT is parsed without verifying the
1313
signature.</p>
1414
<sample src="MissingJwtSignatureCheckBad.go" />
15-
<p>In the example below, the appropriate function for parsing a JWT
16-
and verifying its signature is used.</p>
15+
<p>The following (good) example uses the appropriate function for parsing a JWT
16+
and verifying its signature.</p>
1717
<sample src="MissingJwtSignatureCheckGood.go" />
1818
</example>
1919
<references>

go/ql/src/Security/CWE-347/MissingJwtSignatureCheck.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/**
22
* @name Missing JWT signature check
3-
* @description Failing to check the Json Web Token (JWT) signature may allow an attacker to forge their own tokens.
3+
* @description Failing to check the JSON Web Token (JWT) signature may allow an attacker to forge their own tokens.
44
* @kind path-problem
55
* @problem.severity error
66
* @security-severity 7.8

0 commit comments

Comments
 (0)