You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -110,7 +110,7 @@ So we use local data flow to find all expressions that flow into the argument:
110
110
import swift
111
111
import codeql.swift.dataflow.DataFlow
112
112
113
-
from CallExpr call, MethodDecl method, Expr sourceExpr, Expr sinkExpr
113
+
from CallExpr call, Method method, Expr sourceExpr, Expr sinkExpr
114
114
where
115
115
call.getStaticTarget() = method and
116
116
method.hasQualifiedName("String", "init(format:_:)") and
@@ -247,7 +247,7 @@ The following global taint-tracking query finds places where a string literal is
247
247
248
248
from DataFlow::Node sourceNode, DataFlow::Node sinkNode
249
249
where ConstantPasswordFlow::flow(sourceNode, sinkNode)
250
-
select sinkNode, "The value '" + sourceNode.toString() + "' is used as a constant password."
250
+
select sinkNode, "The value $@ is used as a constant password.", sourceNode, sourceNode.toString()
251
251
252
252
253
253
The following global taint-tracking query finds places where a value from a remote or local user input is used as an argument to the SQLite ``Connection.execute(_:)`` function.
@@ -267,7 +267,7 @@ The following global taint-tracking query finds places where a value from a remo
267
267
268
268
predicate isSink(DataFlow::Node node) {
269
269
exists(CallExpr call |
270
-
call.getStaticTarget().(MethodDecl).hasQualifiedName("Connection", "execute(_:)") and
270
+
call.getStaticTarget().(Method).hasQualifiedName("Connection", "execute(_:)") and
0 commit comments