Skip to content

Commit 74dba95

Browse files
Apply suggestions from docs review
Co-authored-by: Sam Browning <[email protected]>
1 parent cca6a13 commit 74dba95

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

java/ql/src/Security/CWE/CWE-927/SensitiveResultReceiver.qhelp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
<qhelp>
33

44
<overview>
5-
<p>If a <code>ResultReceiver</code> is obtained from an untrusted source, such as being unparcelled from an <code>Intent</code> that was received by an exported component,
6-
sensitive data such as passwords should not be sent to it. Otherwise, this sensitive information may be leaked to a malicious application.</p>
5+
<p>If a <code>ResultReceiver</code> is obtained from an untrusted source, such as an <code>Intent</code> received by an exported component,
6+
do not send it sensitive data. Otherwise, the information may be leaked to a malicious application.</p>
77
</overview>
88

99
<recommendation>

java/ql/src/Security/CWE/CWE-927/SensitiveResultReceiver.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
/**
22
* @name Leaking sensitive information through a ResultReceiver
3-
* @description An Android application obtains a ResultReceiver from a
4-
* third-party component and uses it to send sensitive data
3+
* @description Sending sensitive data to a 'ResultReceiver' from an untrusted source
4+
* can allow malicious actors access to your information.
55
* @kind path-problem
66
* @problem.severity error
77
* @security-severity 8.2

0 commit comments

Comments
 (0)