Skip to content

Commit 0dceabe

Browse files
committed
JS: Reference specific section of cheat sheet
1 parent 226792c commit 0dceabe

File tree

2 files changed

+3
-1
lines changed

2 files changed

+3
-1
lines changed

docs/codeql/codeql-language-guides/data-flow-cheat-sheet-for-javascript.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -133,6 +133,8 @@ System and Network
133133
- `PersistentWriteAccess <https://codeql.github.com/codeql-standard-libraries/javascript/semmle/javascript/Concepts.qll/type.Concepts$PersistentWriteAccess.html>`__ -- writing to persistent storage
134134
- `SystemCommandExecution <https://codeql.github.com/codeql-standard-libraries/javascript/semmle/javascript/Concepts.qll/type.Concepts$SystemCommandExecution.html>`__ -- execution of a system command
135135

136+
.. _data-flow-cheat-sheet-for-javascript--untrusted-data:
137+
136138
Untrusted Data
137139
--------------
138140

docs/codeql/codeql-language-guides/specifying-additional-remote-flow-sources-for-javascript.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ You can model potential sources of untrusted user input in your code without mak
1111

1212
Specifying remote flow sources in external files is currently in beta and subject to change.
1313

14-
As mentioned in the :doc:`Data flow cheat sheet for JavaScript <data-flow-cheat-sheet-for-javascript>`, the CodeQL libraries for JavaScript
14+
As mentioned in the :ref:`Data flow cheat sheet for JavaScript <data-flow-cheat-sheet-for-javascript--untrusted-data>`, the CodeQL libraries for JavaScript
1515
provide a class `RemoteFlowSource <https://codeql.github.com/codeql-standard-libraries/javascript/semmle/javascript/security/dataflow/RemoteFlowSources.qll/type.RemoteFlowSources$Cached$RemoteFlowSource.html>`__ to represent sources of untrusted user input, sometimes also referred to as remote flow
1616
sources.
1717

0 commit comments

Comments
 (0)