File tree Expand file tree Collapse file tree 2 files changed +1
-7
lines changed
lib/codeql/swift/security
test/query-tests/Security/CWE-094 Expand file tree Collapse file tree 2 files changed +1
-7
lines changed Original file line number Diff line number Diff line change @@ -96,16 +96,11 @@ private class JSEvaluateScriptDefaultUnsafeJsEvalSink extends UnsafeJsEvalSink {
96
96
}
97
97
98
98
/**
99
- * A default SQL injection sanitrizer .
99
+ * A default SQL injection sanitizer .
100
100
*/
101
101
private class DefaultUnsafeJsEvalAdditionalTaintStep extends UnsafeJsEvalAdditionalTaintStep {
102
102
override predicate step ( DataFlow:: Node nodeFrom , DataFlow:: Node nodeTo ) {
103
103
exists ( Argument arg |
104
- arg =
105
- any ( CallExpr ce |
106
- ce .getStaticTarget ( ) .( MethodDecl ) .hasQualifiedName ( "String" , "init(decoding:as:)" )
107
- ) .getArgument ( 0 )
108
- or
109
104
arg =
110
105
any ( CallExpr ce |
111
106
ce .getStaticTarget ( )
Original file line number Diff line number Diff line change 27
27
| UnsafeJsEval.swift:208:7:208:39 | ... .+(_:_:) ... : | UnsafeJsEval.swift:279:13:279:13 | string : |
28
28
| UnsafeJsEval.swift:208:7:208:39 | ... .+(_:_:) ... : | UnsafeJsEval.swift:285:13:285:13 | string : |
29
29
| UnsafeJsEval.swift:208:7:208:39 | ... .+(_:_:) ... : | UnsafeJsEval.swift:299:13:299:13 | string : |
30
- | UnsafeJsEval.swift:211:19:211:41 | call to Data.init(_:) : | UnsafeJsEval.swift:214:7:214:49 | call to String.init(decoding:as:) : |
31
30
| UnsafeJsEval.swift:211:19:211:41 | call to Data.init(_:) : | UnsafeJsEval.swift:214:24:214:24 | remoteData : |
32
31
| UnsafeJsEval.swift:211:24:211:37 | .utf8 : | UnsafeJsEval.swift:144:5:144:29 | [summary param] 0 in Data.init(_:) : |
33
32
| UnsafeJsEval.swift:211:24:211:37 | .utf8 : | UnsafeJsEval.swift:211:19:211:41 | call to Data.init(_:) : |
You can’t perform that action at this time.
0 commit comments