Skip to content

Commit 215682f

Browse files
author
Max Schaefer
committed
JavaScript: Add change note.
1 parent 7ddf5ce commit 215682f

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

change-notes/1.25/analysis-javascript.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@
4747
| Code injection (`js/code-injection`) | More results | More potential vulnerabilities involving NoSQL code operators are now recognized. |
4848
| Zip Slip (`js/zipslip`) | More results | This query now recognizes additional vulnerabilities. |
4949
| Unused property (`js/unused-property`) | Less results | This query no longer flags properties of objects that are operands of `yield` expressions. |
50+
| Prototype pollution in utility function (`js/prototype-pollution-utility`) | More results | This query now recognizes more coding patterns that are vulnerable to prototype pollution. |
5051

5152
The following low-precision queries are no longer run by default on LGTM (their results already were not displayed):
5253

@@ -79,3 +80,4 @@ The following low-precision queries are no longer run by default on LGTM (their
7980
- `Parameter.flow()` now gets the correct data flow node for a parameter. Previously this had a result, but the node was disconnected from the data flow graph.
8081
- `ParameterNode.asExpr()` and `.getAstNode()` now gets the parameter's AST node, whereas previously it had no result.
8182
- `Expr.flow()` now has a more meaningful result for destructuring patterns. Previously this node was disconnected from the data flow graph. Now it represents the values being destructured by the pattern.
83+
* The global data-flow and taint-tracking libraries now model indirect parameter accesses through the `arguments` object in some cases, which may lead to additional results from some of the security queries, particularly "Prototype pollution in utility function".

0 commit comments

Comments
 (0)