Skip to content

Commit 9156316

Browse files
RasmusWLyoff
andauthored
Python: Apply suggestions from code review
Co-authored-by: yoff <[email protected]>
1 parent 0ade23a commit 9156316

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

python/ql/src/Security/CWE-327/WeakSensitiveDataHashing.qhelp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
<li>
2020
collision attacks: if you know a hash value <code>h(x)</code>,
2121
you should not be able to easily find a different input <code>y</code>
22-
such that hash value is the same <code>h(x) = h(y)</code>.
22+
with the same hash value <code>h(x) = h(y)</code>.
2323
</li>
2424
</ul>
2525
<p>
@@ -30,7 +30,7 @@
3030
</p>
3131

3232
<p>
33-
As an example, both MD5 and SHA-1 is known to be vulnerable to collision attacks.
33+
As an example, both MD5 and SHA-1 are known to be vulnerable to collision attacks.
3434
</p>
3535

3636
<p>

python/ql/src/semmle/python/dataflow/new/SensitiveDataSources.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/**
22
* Provides an extension point for for modeling sensitive data, such as secrets, certificates, or passwords.
3-
* Sensitive data is can be interesting to use as data-flow sources in security queries.
3+
* Sensitive data can be interesting to use as data-flow sources in security queries.
44
*/
55

66
private import python

0 commit comments

Comments
 (0)