Skip to content

Commit d917654

Browse files
Apply suggestions from code review
Co-authored-by: Alex Ford <[email protected]>
1 parent 3811eae commit d917654

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

ruby/ql/lib/codeql/ruby/security/UnsafeCodeConstructionCustomizations.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,10 +81,10 @@ module UnsafeCodeConstruction {
8181
* A string constructed from a string-literal (e.g. `"foo #{sink}"`),
8282
* where the resulting string ends up being executed as a code.
8383
*/
84-
class StringFormatAsSink extends Sink {
84+
class StringInterpolationAsSink extends Sink {
8585
Concepts::CodeExecution s;
8686

87-
StringFormatAsSink() {
87+
StringInterpolationAsSink() {
8888
exists(Ast::StringlikeLiteral lit |
8989
any(DataFlow::Node n | n.asExpr().getExpr() = lit) = getANodeExecutedAsCode(s) and
9090
this.asExpr().getExpr() = lit.getComponent(_)

ruby/ql/src/queries/security/cwe-094/UnsafeCodeConstruction.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ to define the getter method.
6969
<example>
7070
<p>
7171
This example dynamically registers a method on another class which
72-
forwards its arguments to a target class. This approach uses
72+
forwards its arguments to a target object. This approach uses
7373
<code>module_eval</code> and string interpolation to construct class variables
7474
and methods.
7575
</p>

0 commit comments

Comments
 (0)