Skip to content

Commit bb58a50

Browse files
authored
Update GroovyInjection.qhelp
1 parent f2de440 commit bb58a50

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

java/ql/src/experimental/Security/CWE/CWE-094/GroovyInjection.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The fundamental problem is that Groovy is a dynamic language, yet SecureASTCusto
2929

3030
This makes it very easy for an attacker to bypass many of the intended checks
3131
(see https://kohsuke.org/2012/04/27/groovy-secureastcustomizer-is-harmful/).
32-
Therefore, besides SecureASTCustomizer, runtime checks are also necessary before calling Groovy methods
32+
Therefore, besides <code>SecureASTCustomizer</code>, runtime checks are also necessary before calling Groovy methods
3333
(see https://melix.github.io/blog/2015/03/sandboxing.html).
3434

3535
It is also possible to use a block-list method, excluding unwanted classes from being loaded by the JVM.

0 commit comments

Comments
 (0)